Institutional Knowledge and Threat Actors

Institutional Knowledge and Threat Actors

I was reading about threat actors (bad guys who carry on cyber attacks) and the phrase "institutional knowledge" really popped... this relates to attacks done by insiders and very few people pay attention to them, even care about mitigating this very serious risk....

read more
What is Malvertising?

What is Malvertising?

During our daily web routines (reading the news, doing some "Facebooking", online banking or reading our Gmail) we are constantly visiting websites that show some sort of advertisement, usually on the right or upper side of the screen. Although I believe quality...

read more
Is your business PCI compliant?

Is your business PCI compliant?

If you take credit card payments, you need to know about PCI Compliance.   For the past 5 years or so, we have seen an increase on the number of service requests about something called PCI. In a nutshell: client gets email from PCI/his-her bank or merchant...

read more
3 biggest cybersecurity myths

3 biggest cybersecurity myths

No doubt cybersecurity is now part of our daily conversations - cryptocurrency hacking, election meddling, leaks and exposes, it is something that we all have learn to live with. Unfortunately, there are still (many) people that believe cybersecurity is something "my...

read more
Beware of fake and dangerous Android apps

Beware of fake and dangerous Android apps

According to the Internet machine it is estimated there are more than 2 billion (yes, billion with a b) active Android devices in the world. Now imagine for a second that you are an evil villain straight out a Bond movie with a super magical computer that could take...

read more
Avoid scams when shopping online

Avoid scams when shopping online

Reading an article on a well-known cyber security website I thought it was a really good idea to post about the most common mistakes people make when buying something online and how to keep your personal and financial information safe from scammers/hackers/bad guys in...

read more
Tips on Detecting Phishing emails

Tips on Detecting Phishing emails

By now you have probably heard about phishing (fake emails that look legitimate, usually from senders that you have some dealings with - but no always). I receive at least one every two weeks or so and I usually just delete them right away. After reading about this I...

read more
How End-User Devices Get Hacked: 8 Easy Ways

How End-User Devices Get Hacked: 8 Easy Ways

When it comes to scamming consumers and businesses, the most effective strategies aren't necessarily the most complex. Hackers seeking funds, data, and access to corporate systems don't need advanced techniques when tried-and-true tactics consistently work on their...

read more
Five Questions Board Members Should Ask Their CISO

Five Questions Board Members Should Ask Their CISO

Source: https://www.infosecurity-magazine.com/blogs/five-questions-board-members-ciso/ Security isn’t something that can just be swept under the rug while the board and executive team plans on just pointing figures if something bad happens. Cybersecurity threats are...

read more