It takes only 15 minutes for the threat actors to start scanning for vulnerabilities when they are discovered. How quickly do you respond to gaps in your cybersecurity?

Social Engineering and Email Cyber Security Training

It is obvious but even the biggest organisations and governments in the world will be responding slower that the threat actors – so there will always be gaps in the cyber security. Hackers scan for vulnerabilities within 15 minutes of disclosure (bleepingcomputer.com) Here is a real world example of a …

How do threat actors get hold of your login credentials? They just ask you to send them over!

The US Government has issued a warning over the growth of text messages that are designed to manipulate you into giving away your secret information. US govt warns Americans of escalating SMS phishing attacks (bleepingcomputer.com) If it is happening in the US, why not extend the attacks to other English …

And we thought blocking Microsoft Office macros was a good idea – but close one door to the threat actors and of course they find another way to get to you…

Research is showing that with Microsoft now blocking Office VBA macros from the internet, threat actors are moving to other attachments that can execute malicious instructions, such as Windows Shortcut .lnk, .iso and .rar. As Microsoft blocks Office macros, hackers find new attack vectors (bleepingcomputer.com) My advice: Make sure your …