Stay sharp: 5 cyber scams to look out for

Welcome to this month’s tech news. Here you will find:
- Watch Out: 5 cyber scams to be aware of.
- Microsoft: What’s new?
- Tech Facts: Did you know?
- Q & A: What everyone’s asking
- Quiz Time: Test your team!
Enjoy the read, and remember to give us a call if you have any IT concerns – we’re here to help!

5 cyber scams to be aware of
Cyber scams don’t need to be high-tech to cause serious damage.
In fact, some of the most successful attacks rely on something far simpler — busy people making quick decisions without a second thought.
From fake voices to fraudulent investments, cybercriminals are finding clever new ways to exploit trust and steal data. The good news? Staying informed is one of the easiest ways to protect your business.
Here are five scams we’re seeing right now — and how they work:
1. Fake caller scams
Scammers are increasingly targeting cellphones directly. They may pretend to be your bank, courier service, or even an IT support technician, urging you to “verify” an account or share a one-time PIN. These calls often sound professional and create pressure to act fast — don’t. Hang up and contact the organisation directly using a verified number.
2. OTP and account-takeover scams
These scams often start with an SMS claiming to be from SARS, your bank, or a service provider. You’re asked to share or enter a one-time PIN (OTP) to “secure” your account — but doing so hands access straight to a scammer. OTPs are also used to hijack WhatsApp accounts and enable SIM swaps. Rather slow down, double-check the source, and never share codes with anyone who calls or messages you unexpectedly.
3. Crypto investment scams
Scammers use convincing emails, social media posts, or “investment platforms” to promise unbelievable returns. Once you’ve deposited funds, the project vanishes — a tactic known as a rug pull. Even experienced investors and businesses have been caught by these high-pressure, too-good-to-be-true offers.
4. Romance (or “pig-butchering”) scams
These might sound personal, but they often have business consequences. Fraudsters build long-term trust online — sometimes using AI-generated images or videos — before convincing victims to share sensitive data or send money. Some later threaten to leak private content unless paid. These scams target individuals at every level, from junior staff to executives.
5. Robocall scams
AI now makes it frighteningly easy to clone someone’s voice using just a short audio clip. You might get a call that sounds exactly like a supplier, client, or colleague, urgently asking you to confirm payment details or authorise a transfer. It feels legitimate — but it isn’t.
All of these scams have one thing in common: they exploit human attention and trust.
A quick click or hasty confirmation can be all it takes.
That’s why regular cybersecurity awareness training is so important — it keeps your team alert, cautious, and confident when something doesn’t look quite right.
To stay protected:
- Never share one-time PINs (OTPs) or verification codes — even if the request sounds urgent or official.
- Don’t let a sense of urgency rush your decisions. Take a moment to verify before acting.
- Be cautious of links in unexpected emails, messages, or ads — rather go directly to the official website.
- Treat unknown phone numbers with care, especially if the caller asks for personal or payment information.
A few extra seconds of caution can prevent serious losses.
—
At GZD, we help businesses strengthen their defences through proactive monitoring and secure device management to staff training and awareness programmes.
Need help keeping your team vigilant against scams like these? ‣

What’s new to Microsoft?
More control over your software
Microsoft’s testing a new policy that could make it much easier to remove Windows built‑in apps you don’t want.
In a recent preview build, there’s an option called “Remove Default Microsoft Store packages from the system” tucked under Administrative Templates.
Turn it on, and it lets you tick apps like Teams, Weather, Xbox services, or even Snipping Tool and Paint (if you really want to). Then remove them in one go, instead of uninstalling each individually.
Core apps like Edge are still untouchable, and the feature is still in testing. But it’s a step toward giving businesses more control over the software on their devices.
Hotpatching is GO
Hotpatching is now part of Windows Autopatch, which you manage using Microsoft Intune (a tool to look after your company’s devices). This makes it easier to keep devices secure without stopping people from working.
What’s Hotpatching, you ask?
Hotpatching installs Windows quality updates in the background, without forcing a restart. Your team stays protected while staying productive.
Any new update policies created in Intune have this switched on by default. And existing policies can be updated by enabling the “apply without restarting the device (hotpatch)” option in the Intune admin centre.
It’s a simple change that helps reduce downtime and keeps your devices compliant with the latest security updates.

Did you know?

Even Elmo needs cyber security training!
Elmo, the lovable Sesame Street star, recently had his official X (formerly Twitter) account hacked. And some very un- family‑friendly posts were made.
Experts quickly pointed out that a simple security step called Two‑Factor Authentication (2FA) could have stopped the hackers. That’s the extra step where, after your password, you also need a code from your phone or an app to log in.

It’s a basic safeguard every business should use on social media, email, and banking accounts. And if it’s important enough for Elmo to learn, it’s definitely important for your team too.
Tech Facts:
- Amazon now has almost as many robots in its warehouses as it does human workers. Over a million robots are busy zipping around, picking, packing, and moving goods alongside people in sites all over the world. It’s a glimpse into how automation is reshaping the way businesses operate behind the scenes.
- Korean scientists have been testing a new kind of PC filter inspired by the human nose. It uses a light coating of oil (just like the mucus on our nasal hairs) to trap dust more effectively and keep the inside of a computer clean. It might sound a bit gross, but it could mean far less dust clogging up your devices in the future.
- Scientists in Japan have smashed the world record for internet speed, hitting 1.02 petabits per second. That’s about 127,500 gigabytes every single second, over 1,800 km of fibre optic cable. To put that in perspective, it’s roughly 350,000 times faster than the average home broadband. At that speed, you could download the entire Netflix library in under a second.

Q & A
Q: Is it ok to let staff install their own apps on work devices?
A: Not without approval. Unchecked apps can introduce malware or data leaks.
Q: How often should we test our data backups?
A: A few times a year at a minimum and check your backup is working weekly. A backup isn’t useful if it doesn’t restore when you need it.
Q: Can we save money by turning off automatic software updates?
A: No. It might save a little time now but leaves you wide open to attacks fixed by those updates.

Time for a Tech Quiz!

- What is the function of a CPU in a computer?
- What’s the difference between a file and a folder in a computer’s file system?
- What makes “Save” and “Save As” different in most applications?
- What’s the purpose of a web browser’s “private browsing” or “incognito mode”?
- Which file extension typically indicates a video file?
See answers below
Until next time,
The GZD team
Quiz answers:
1. The Central Processing Unit processes data and executes instructions. It’s the main control centre of your computer.
2. A file is a container for storing data, while a folder is a collection of files.
3. “Save” overwrites the existing file, while “Save As” lets you save a copy with a new name or location.
4. It stops your browsing history and cookies being stored on your computer.
5. MP4