SOCIAL ENGINEERING 101

Categories:Security News

That firewall or antivirus won’t mean much if your users are tricked into clicking on a malicious link they think came from a Facebook friend or LinkedIn connection. Here’s what you need to know to protect your organisation and your users. Social engineering is essentially the art of gaining access to buildings, systems or data … Continue reading SOCIAL ENGINEERING 101

Read more

Cloud security

Categories:Security News

Colin Bertram Are you utilising cloud computing technologies? Is your firm considering the cloud? Concerned about security? You should be – but don’t let this stop you! Cloud providers generally follow one of three service models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS). Under the Infrastructure … Continue reading Cloud security

Read more

Should security awareness be fun?

Categories:Security News

Companies experiencing a cyberattack certainly are not thinking about fun when they deal with the results. There’s a good chance that the breach happened because security awareness wasn’t a focus for an employee who simply clicked the wrong link or accessed the wrong website. Employees need to be educated about cyber risks, but training can … Continue reading Should security awareness be fun?

Read more

Third party hacking

Categories:Security News

One of the most fatal mistakes an organization can make is thinking cyber attackers are the same caliber of criminal as the juvenile delinquents shoplifting and asking for cigarettes at the local mall. Sure, some hackers are just as pathetic, but these aren’t the ones your business (should) need to worry about. With this in … Continue reading Third party hacking

Read more

Ransomware manipulates your brain to pay up.

Categories:Security News

Ransomware is surprisingly big business, and big businesses are ruthlessly efficient at getting what they want. Some criminal outfits have even reached a scale where they can employ surprisingly efficient customer service operatives to field user queries, just like legitimate businesses. But there’s more to getting payment than having assistance on tap, and a new … Continue reading Ransomware manipulates your brain to pay up.

Read more

Psychology and Security

Categories:Security News

“We are currently using a number of different solutions and vendors for security products and training… I’m not sure what else can be done?” That’s often what I hear from IT professionals at potential clients. The tone is usually desperate as despite all the investment in the latest and greatest technologies and the “once a … Continue reading Psychology and Security

Read more

Social Media Engineering

Categories:Security News

When we want to share our family vacation pics or an amazing dinner we’re about to eat, to catch up on what’s going on with friends and family, to see what’s happening in the news, or have discussions on different topics, where do we go for all that? Facebook, Twitter, Instagram, Pinterest, LinkedIn and other … Continue reading Social Media Engineering

Read more

Security Knowledge, Attitude, Behaviour Program Overview

Categories:Security News

Introduction All organisations today rely heavily on the internet, information systems, communications systems and collaboration in business, investing significantly in these resources to compete in today’s global marketplace.  This investment in these, however, exposes organisations to risks and threats that can result in major losses such as financial, intellectual property, customers and reputation. To protect … Continue reading Security Knowledge, Attitude, Behaviour Program Overview

Read more

Security awareness is a joke

Categories:Hints and Tips

All organisations rely heavily on the internet, investing significant resources as a means to compete in today’s global marketplace. This investment in the internet, however, exposes organisations to risks and threats that result in major losses such as financial, intellectual property and reputation. To protect from these adverse risks and threats, organisations often resort to … Continue reading Security awareness is a joke

Read more

WannaCry Ransomware Decryption Keys

Categories:Hints and Tips

The WannaCry’s encryption scheme works by generating a pair of keys on the victim’s computer that rely on prime numbers, a “public” key and a “private” key for encrypting and decrypting the system’s files respectively. To prevent the victim from accessing the private key and decrypting locked files himself, WannaCry erases the key from the system, leaving … Continue reading WannaCry Ransomware Decryption Keys

Read more

© Copyright - layer8security - Design by CodexZone
Menu Title