IT Security Information
Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.
The Top 5 Spear Phishing Examples and Their Psychological Triggers
What is Phishing?Phishing is one of the popular techniques of social engineering. Attackers send misleading emails or communications while disguising themselves as reputable organizations, such as banks or well-known websites. These communications frequently include...
10 Most Common Types of Cyber Attacks You Should Know About
The best way to protect your digital life is to assume it's going to be hacked. In practical terms, it is essential to implement various cybersecurity measures before your data is compromised. Once your data is compromised, it may be too late to fully mitigate the...
How to Prevent a Data Breach by Training Your Employees
When a data breach happens, there are disastrous consequences affecting us as individuals or corporations. The digital world is vulnerable, and data breaches serve as a reminder that we must continually work towards stronger security measures. Due to data breaches,...
The Dangerous Role of Human Error in Cybersecurity
As modern technology becomes increasingly more central to our personal and working life, the darker side of human error in cybersecurity is also becoming more noticeable. Twenty years ago, some businesses could function without their IT technology for a day or two;...
SysAdmin Day – An appreciation day for all SysAdmins
Can you believe it's that time again? SysAdmin Day has made its return, bringing with it a boundless appreciation for the exceptional SysAdmins who tirelessly support us around the clock. We extend our heartfelt thanks to all the SysAdmins who have averted disasters,...
IT Cybersecurity Compliance Survey
4 in 5 respondents think following compliance frameworks is 'very' or 'extremely' important, the Hornetsecurity 2023 IT Cybersecurity Compliance survey finds.Key takeaways from the 2023 IT Cybersecurity Compliance Survey by Hornetsecurity 78.8% of organizations are...
Introducing 365 Permission Manager – Manage Permissions and Enforce Compliance Effortlessly
Introduction - 365 Permission ManagerThere are three pillars of a Zero Trust approach to cyber security: Verify explicitly Assume breach Use least-privilege access The first one is about verifying every connection (no network connection is safe just because it’s...
Phishing attacks increasingly sophisticated: Cat and mouse – and no end in sight
Phishing is one of the most popular types of cyberattacks. In the corporate environment, social engineering fraudsters prefer to exploit employees as a vulnerability to obtain sensitive information such as log-in and financial data or to trigger malicious actions. ...