Cyber Criminals use Artificial Intelligence (AI) to scam company

Cyber Criminals use Artificial Intelligence (AI) to scam company A CEO of a UK based energy firm has been duped into transferring £201,000 to cyber criminals. The CEO believed that he was speaking with his German boss on the phone. The impersonator requested a bank transfer to one of their Hungarian suppliers. The payment was […]

How can I protect my email from malicious attack?

How can I protect my email from malicious attack? Many IT departments or IT companies will say “you need xyz product to protect you from 123” but the vast majority of cyber attacks are the result of a phishing campaign against the company. No matter what email service you use (Office 365, Gmail or another); […]

Delivery Scam

Delivery Driver Scam

Delivery Scam So, there’s a knock at your door and it’s a delivery driver who’s got a parcel for you. You don’t remember ordering anything but you sign for it and go inside. When you open it, you find that it’s a brand new mobile phone but you’re confused, you’ve not ordered it! Later in […]

Stockport Frogs

Stockport Frogs Today marks the official launch of the Stockport Frogs. Amshire are proud to help Totally Stockport in the launch of the art trail in Stockport over the summer. The giant frogs have leapt onto giant lily pads strategically located throughout Stockport town centre, creating an engaging and vibrant, outdoor art trail with the […]

The Cost of Ransomware

Businessman hand holding money banknote for paying the key from hacker for unlock folder got ransomware malware virus computer

The Cost of Ransomware Hackers have frozen a global organisation with 22,000 computers across 170 different sites around the world for the last 3 months. Hackers who operate Ransomware Cyber-attacks demand extortionate amounts of money to reinstate systems but Norsk Hydro refused to pay the hackers demand but so far they’ve spent £45m trying to […]

Free Dark Web Scan

Free Dark Web Scan

Are Your Company’s Digital Credentials for Sale on the Dark Web? Find Out with a Complimentary Dark Web Scan Detect Compromised Credentials Used to Exploit Employees and Customers To help keep your critical business assets safe from the compromises that lead to breach and theft, we are offering a complimentary, one-time scan of the Dark […]

Amshire gains Cyber Essentials certification

Amshire has achieved the Cyber Essentials accreditation, a UK government backed standard for companies taking all necessary steps to protect themselves from cyber-attacks and to keep customer data safe. Cyber Essentials accreditation is also a requirement for all businesses planning to bid for government contracts that involve handling personal information. Certification is included as part […]

RIP Windows 7 and hello to Windows 10

RIP Windows 7 hello Windows 10

A reminder for those still using the Windows 7 Operating System, you have less than one year until Microsoft ends its extended support for this operating system.  Support ends 14th January 2020  Microsoft used automatic updates to deploy security patches to your PC.  The security patches were an essential way of helping to protect your […]

Passwords are no longer secure – add two factor authentication

Passwords - Two factor authentication

The default for all User logons whether local or remote has always been reliant upon the humble password.  Considered “good enough” security in the past, passwords known to be the weakest link, staying connected in the modern world. There are reports in the media all too often about passwords being stolen, either electronically or by […]

Cyber Security – Understanding the threat

Cyber Security - Understanding the threat

Understanding cyber threats The cybersecurity landscape is always evolving.  Cybercriminals continue to seek out new ways to exploit vulnerabilities, whilst security specialists release new patches and protocols to counter or mitigate such cyber threats. It is possible to hone in on several key factors that are contributing to the increased threat level facing SMBs. The […]