I have published part 4 of my Back-to-Basics mini-series looking at how phishing attacks work and how they impact organisations every day, over on CyberAwake. Phishing Primer – Phishing Types (pt. 4) Here are parts 1 to 3: Phishing Primer – Social Engineering (pt. 1) Phishing Primer – Social Engineering …
Something extra for the weekend.
“Beacuase It’s Friday” has been published for this week – Because It’s Friday – Electronic Mail | Smart Thinking Solutions – but as I was reading the cyber security news this morning this page came up on my BBC News feed. A BBC Newsround report from 1992 about the Michelangelo …
Fake cheat codes should get you thinking about your hybrid workers
I am never popular when I am helping organisations create cyber security plans and I insist that company laptops are only for company business. This applies double when the laptop is used at home or on holiday – you cannot let your significant other or others use the company computer. …
Continue reading “Fake cheat codes should get you thinking about your hybrid workers”
It is a while since I have written about Ransomware
Once ransomware gets into an organisation, usually through some type of phishing attack, that organisation will have a problem that will cost it money and will damage its reputation. So, anything that makes it easier for ransomware attacks to flourish and increase has to be bad news for every organisation …
Continue reading “It is a while since I have written about Ransomware”
Social Engineering is real and costs organisations money – get your team trained.
First let’s get a definition of social engineering: Social engineering is the art of manipulating people to give up confidential information. The types of information compromised can vary, but when organisations are targeted, the criminals are usually trying to trick you into giving them your credentials for secure systems you …
Continue reading “Social Engineering is real and costs organisations money – get your team trained.”