What is stored on your computer and mobile device?
Most people underestimate the amount of personal details that are stored on mobile devices and computers. These devices retain a lot of information about you which can be used by cybercriminals. Below is a list that may enlighten you as to the amount and type of data that is stored and provide you with some... Learn More
Can you Hack IT?
Layer 8 Security has developed the first, automated, theme-based, and fully portable, Cyber Escape Room to enhance the way in which Security Awareness is taught. Below are some screenshots from the New Virtual Cyber Escape Room. There is a video introduction into the game, explaining the rules and concepts. The talented “Anonymous” explains the... Learn More
Paying it Forward
In this time of life-altering change, Layer 8 Security is offering to assist any company with an offer to make their lives a bit easier. We acknowledge that many of you are extremely busy addressing the need for staff to work remotely. This, for many of you, has exhausted most of your resources, focusing on... Learn More
Working from Home
With the significant increase in social engineering attacks, especially in light of the “work from home” requirements, I am finding myself in an uncomfortable situation. Many companies are expecting their staff to work from home, be positive and productive in light of the need to self-isolate. Unfortunately, cybercriminals also working hard to attack people working... Learn More
emt Distribution signs Layer 8 Security to address the human dimension of cyber risk prevention
Reseller partners can offer first fully measurable Security Behaviour Framework and Cyber Escape Room training adventures in Australia, New Zealand and Asia Adelaide, Australia – 18 February 2020: Cyber security software specialist, emt Distribution, today announced an agreement with Australian company, Layer 8 Security to offer a complete suite of security awareness solutions leveraging progressive... Learn More
How much information we Retain & how much we Forget
Our brains can easily accommodate so much information, but why is it that we remember some things vividly while forget others almost instantly. The solution to overcome this memory retention ration is hidden in the analysis itself. Have a look, till “The Cone of Learning” It turns out, there’s a formula that describes how we... Learn More
Two ways to identify a Phishing email – one easy, the other, complex
The normal ways everyone is taught to identify Email Phishing attacks is to follow the following 10 tips: Tip 1: Don’t trust the display name A favourite phishing tactic among cybercriminals is to spoof the display name of an email. Here’s how it works: If a fraudster wanted to spoof the hypothetical brand “My Bank,”... Learn More
Interesting scam alert
This is very clever. I would probably fall for it if not warned. Give this wide distribution. This scam is actually very clever. Just when you thought you’d heard it all. Be very careful out there! Beware of people bearing gifts! The following is a recounting of the incident from the victim: Wednesday a week... Learn More
Why Security Awareness Does Not Work and What to Do Instead
It is no secret that phishing has become a huge problem. The current Phishing and Email Fraud Statistics 2019 are: The average financial cost of a data breach is $3.86m (IBM) Phishing accounts for 90% of data breaches 15% of people successfully phished will be targeted at least one more time within the year BEC... Learn More
Security Awareness Training is ineffective!
With an ever-increasing amount of cyber-attacks being undertaken and staff pressures increasing which often leading to human errors, we need to look differently at Security Awareness Training. I am sure that there is one thing all security experts should be able to agree upon, and that is that the vast majority of security awareness training... Learn More