Phishing Explained

Other than knowing that phishing is a bad thing, having a basic understanding could greatly improve your cybersecurity resilience. You could then avoid common forms of attack because finding a victim via phishing is the hackers first step. First, it is important to understand the role and importance of social media. By using LinkedIn, hackers can map out the management structure of a target company. They can identify, by name, key people in key roles, such as their CEO or CFO. They may be able to identify key people in their teams, again by name and job title. For each… Read more



What Should Terrify Everyone In Management

Every successful cyberattack depends on two people – the hacker, and someone on the inside. That’s the bit that should terrify you: someone in your organisation is going to enable an attack on your computer network. It could be someone careless, or poorly trained, or working under pressure to tight deadlines. It could be someone with a grudge against your organisation. Or it could even be someone who only occasionally accesses your network to submit holiday requests. They are all a risk to your organisation. The skilled hacker knows how to exploit everyone, all they need is a foothold in… Read more