Time to add another chapter to my Phishing Email Primer: It is being reported that threat actors have been using a new targeting tactic to sort through victims who have been ensnared by their social engineering attacks. When presented with the malicious credentials Window, only those high-value victims who have …
Delivery Scam – follow up
No, not an explanation from Evri or AliExpress – not that I expected one from either of them following this article: But a useful advice article from the Google blog: Google shares tips to avoid email, phone, text and Search scams Your Takeaway Two things. Photo by Tara Winstead
The Blame Game
I finished my previous “Wednesday Bit” article with the following paragraph about blame: “Just don’t blame your people if they click on a link – get them to report it so steps can be taken to limit the damage. There is a link between blame and the amount of damage …
Simply Phishing
We all hear so much about phishing attacks that it can become just background noise, rather than a risk and threat to our organisations – I am guilty of adding to noise as I regularly write about the various types of phishing attacks. For instance, I wrote a whole Back-to-Basics …
There are consequences for poor cyber security
A cyber security incident will obviously cost your organisation money and probably damage your reputation. It will cost you more if you have neglected to take responsibility and have a cyber security stance that reflects the risks and threats you face. NHS software provider fined £3m over data breach – …
Continue reading “There are consequences for poor cyber security”