Phishing: Big phish, little phish

Landing just one phish can be disastrous. How many times have you heard that it only takes one phishing email to cause damage? That’s because it really does only take one. One email to an employee. One click on a link. One fake website. One password entered. One very happy criminal. What is a ‘typical’ […]

Read More
Owning your digital footprint

Take control before someone else does. Complementing her previous article on the company’s digital footprint, Rachael West explains threats to your personal digital footprint and how you can own and protect it. Have you ever Googled yourself? You may be surprised by what information you can find about yourself just from a simple online search. […]

Read More
Owning your company’s digital footprint

Your organisation’s credentials are out there for all to see. Marketing messages, business statements, company information and everything written, posted or downloaded leaves a permanent trace in cyberspace. This is your organisation’s digital footprint. It is your online identity, made up of your unique set of traceable online activities, communications and information. Everything that goes […]

Read More
5 security awareness lessons to take away from 2018

What lessons can we learn from the past year and how can they inform our security awareness strategies going forward…?

Read More
3 types of insider threat and what to do about them

Updated 06 October ’20 Many companies take careful measures to protect their critical assets from external risks, but they often remain vulnerable to insider threats. The latest Verizon Data Breach Investigations Report (DBIR) 2020, shows that 70% of cyber attacks were perpetrated by outsiders, such as organised criminal groups. This has remained fairly consistent over […]

Read More
5 ways to improve your high risk users campaign

High risk users (HRUs) hold the critical ‘keys to the kingdom’ of any organisation and, as such, represent a cybersecurity risk that no CISO should overlook. Their privileged credentials make them a prime target. If their details were compromised, they could give a cybercriminal unparalleled access to your company’s most sensitive information. As the cybersecurity […]

Read More
A CISO’s guide to: Baseline Behavioural Research

Changing everyone’s behaviour can be done ‘Know thy enemy’ is a mantra often on the lips of the threat-aware CISO. But knowing your friends can be even more critical. Staff can be your human firewall or your hidden vulnerability. You need to know what makes them tick. Social psychologists might say we are best viewed […]

Read More
Why do employees avoid reading policies?

To read or not to read, that is the question. So, what is the answer? Well, it often depends on who you ask. For the policymakers and leaders of an organisation, the answer is an emphatic ’read’. But, on asking an employee whether they have read the company policies, the answer is more likely to […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy