Cyber Security Services: How it makes Business Easy?
In the present business world, organizations of all sizes are continually ensuring and screen all types of innovation, for example, PCs, workstations, cell phones, tablets ensuring that organization data is made sure about busy working, home, and in a hurry. In an atmosphere of tireless dangers, ensuring your cyberspace is not, at this point a... Learn More
Psychological and Security issues when working from home
Have you ever wondered what are the psychological risks and cyber security impacts are, that we encounter when our staff are asked to work at home? Upending the way people work can take its toll on staff psychologically, notwithstanding during an unprecedented crisis like the current pandemic. Working from home can be quite a challenge. Working... Learn More
What is stored on your computer and mobile device?
Most people underestimate the amount of personal details that are stored on mobile devices and computers. These devices retain a lot of information about you which can be used by cybercriminals. Below is a list that may enlighten you as to the amount and type of data that is stored and provide you with some... Learn More
Can you Hack IT?
Layer 8 Security has developed the first, automated, theme-based, and fully portable, Cyber Escape Room to enhance the way in which Security Awareness is taught. Below are some screenshots from the New Virtual Cyber Escape Room. There is a video introduction into the game, explaining the rules and concepts. The talented “Anonymous” explains the... Learn More
Paying it Forward
In this time of life-altering change, Layer 8 Security is offering to assist any company with an offer to make their lives a bit easier. We acknowledge that many of you are extremely busy addressing the need for staff to work remotely. This, for many of you, has exhausted most of your resources, focusing on... Learn More
Working from Home
With the significant increase in social engineering attacks, especially in light of the “work from home” requirements, I am finding myself in an uncomfortable situation. Many companies are expecting their staff to work from home, be positive and productive in light of the need to self-isolate. Unfortunately, cybercriminals also working hard to attack people working... Learn More
emt Distribution signs Layer 8 Security to address the human dimension of cyber risk prevention
Reseller partners can offer first fully measurable Security Behaviour Framework and Cyber Escape Room training adventures in Australia, New Zealand and Asia Adelaide, Australia – 18 February 2020: Cyber security software specialist, emt Distribution, today announced an agreement with Australian company, Layer 8 Security to offer a complete suite of security awareness solutions leveraging progressive... Learn More
How much information we Retain & how much we Forget
Our brains can easily accommodate so much information, but why is it that we remember some things vividly while forget others almost instantly. The solution to overcome this memory retention ration is hidden in the analysis itself. Have a look, till “The Cone of Learning” It turns out, there’s a formula that describes how we... Learn More
Two ways to identify a Phishing email – one easy, the other, complex
The normal ways everyone is taught to identify Email Phishing attacks is to follow the following 10 tips: Tip 1: Don’t trust the display name A favourite phishing tactic among cybercriminals is to spoof the display name of an email. Here’s how it works: If a fraudster wanted to spoof the hypothetical brand “My Bank,”... Learn More
Interesting scam alert
This is very clever. I would probably fall for it if not warned. Give this wide distribution. This scam is actually very clever. Just when you thought you’d heard it all. Be very careful out there! Beware of people bearing gifts! The following is a recounting of the incident from the victim: Wednesday a week... Learn More