Every Day It’s Something New

Cybersecurity in the real world

Welcome to Codotco, your go-to resource for staying updated on the latest trends and developments in the cybersecurity landscape. Whether you’re a seasoned professional or new to the field, our blog offers the insights and information you need to keep your knowledge sharp.

Our mission is to provide in-depth analyses, expert opinions, and the latest news in cybersecurity. Join our community of cybersecurity experts and enthusiasts who are passionate about safeguarding digital environments and staying ahead of cyber threats.

  • How Big Is The Threat? It’s Massive
    If you think this doesn’t affect you because you don’t have any cryptocurrency holdings, you are very much mistaken. North Korea steals $1.5bn as it pulls off world’s biggest ever heist This is a revealing article as it shows the sheer scale of North Korea’s operation and some of their methods. And remember, Russia and China are just as active, if not more so. On top of that there is a whole worldwide industry of smaller hacking groups all actively trying to access your system and cause you harm. This is not all about cryptocurrency, they want real pounds and… Read more
  • Phishing Explained
    Other than knowing that phishing is a bad thing, having a basic understanding could greatly improve your cybersecurity resilience. You could then avoid common forms of attack because finding a victim via phishing is the hackers first step. First, it is important to understand the role and importance of social media. By using LinkedIn, hackers can map out the management structure of a target company. They can identify, by name, key people in key roles, such as their CEO or CFO. They may be able to identify key people in their teams, again by name and job title. For each… Read more
  • What Should Terrify Everyone In Management
    Every successful cyberattack depends on two people – the hacker, and someone on the inside. That’s the bit that should terrify you: someone in your organisation is going to enable an attack on your computer network. It could be someone careless, or poorly trained, or working under pressure to tight deadlines. It could be someone with a grudge against your organisation. Or it could even be someone who only occasionally accesses your network to submit holiday requests. They are all a risk to your organisation. The skilled hacker knows how to exploit everyone, all they need is a foothold in… Read more