In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
Did you know that a staggering 60% of phishing websites are only online for a fleeting 10 minutes?
This latest stat we learned about phishing websites really surprised us, but it does come with good news about an enhanced way to protect your business. Jonathan Cundliffe, Managing Director of Lancashire based J700 Group an IT Support provider and cyber security explains all the details.
The surprising fact that 60% of phishing websites are online for only 10 minutes underlines just how rapidly cyber threats are evolving and how extremely vital it is for us to stay ahead of the game.
What are Phishing Sites?
Phishing sites are fake sites that try to trick you into entering your login details. Or to get you to download malware.
The idea is that cyber criminals drive huge amounts of traffic to them… scam people… then take down the site before it can be detected.
Wouldn’t it be great if we could spot these threats before they vanish into thin air and pop-up elsewhere? Well, Google Chrome has a trick up its sleeve to help us do just that.
 Imagine this: You’re running your business, constantly on the move, making split-second decisions. You absent-mindedly visit a website which looks a little… odd. But you don’t panic. You’re using Google Chrome and it scans websites you visit against its list of malicious URLs.
But Google’s list of bad websites is only updated every 30 to 60 minutes. Thats 60% of phishing domains that are active for just 10 minutes may slip through the net.
How can you protect your business from Phishing Sites
Enter Google Chrome’s new security tool, Enhanced Safe Browsing.
As part of a recent update, Chrome has switched it on for everyone. It will now check URLs against a list of domains in real time. Think of it as a cyber bodyguard who can spot and neutralise threats at lightning speed.
Google has confirmed that Enhanced Safe Browsing will continue to offer features like deep scans for files and protection from malicious extensions.
Does this mean Google will know every URL you visit?
Well, yes and whilst this new feature does share all visited URLs with Google, the information will not be used to power other features, including advertising. It is a trade-off between security and privacy. Given the increasing sophistication of cyber threats, isn’t it worth having an extra layer of protection?
We say embrace these new tools and stay one step ahead of the cyber criminals. After all, the safety of all our businesses depends on it.
If you need additional support protecting your business from phishing scams – or anything else – get in touch with one of our team who are happy to discuss your business’s individual requirements.
J700 Group provide effective IT support and services that enable your business to have secure, responsive and reliable information technology, keeping it running smoothly 24/7. Above this though, we are a family run company who truly care about our customer service and the business relationships we develop.
For more information please contact Angelina or Deon on 0333 7721 700 or email [email protected]
J700 Group are a Lancashire-based, family-run, professional and responsive, Managed Solutions Provider helping Businesses, to utilise Innovative IT Consultancy Services, Cloud Solutions, Cyber Security, Microsoft 365, Telecoms, Web Design and SEO solutions to propel their organisation to the next level and beyond.
As an experienced IT Support Provider, helping businesses across Lancashire & Manchester, if you need any assistance with your IT including IT Hardware, a Disaster Recovery Policy or Managed Backup Solutions please get in touch with one of our team.
Where to find us: Prinny Mill Business Centre, 68 Blackburn Road, Haslingden, Lancashire, BB4 5HL.
#GoogleChrome #EnhancedSafeBrowsing #CyberSecurity
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More