Cyber security awareness training

WORKING FROM HOME

HOW IT REALLY HAPPENED: NINJIO SEASON 3, EPISODE 2, PAID OFF, LAID OFF, WORKING FROM HOME

HOW IT REALLY HAPPENED: NINJIO SEASON 3, EPISODE 2, PAID OFF, LAID OFF, WORKING FROM HOME – In NINJIO’s Season 3, Episode 2, Dan, the CFO at a large company, wanted to make everything simple.  He wanted a process so easy that he could access his company’s network from home [...]

Read more...
Misdelivery

MISDELIVERY – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 12

Misdelivery -In NINJIO’s Season 2, Episode 12, a co-worker sends an email with sensitive data to the wrong client, and Paul is incredibly upset.  He spent years cultivating his client, and with a single misdelivered email, all of that could be in jeopardy.  He needs answers and quickly goes [...]

Read more...
Phishing Threat Campaigns

Phishing Threat Campaigns

Phishing Threat Campaigns – Who are the biggest targets of phishing threats? End-users are the most affected targets against phishing scams since they are targets of many spear-phishing attacks. 1. What are Phishing Threat Campaigns?  Phishing Threat Campaigns are used in phishing simulation campaigns which utilises many email scams that bypass the email [...]

Read more...
What Belongs in a Security Awareness Program

What Belongs in a Security Awareness Program?

What Belongs in a Security Awareness Program? – Security is also a people problem. Security awareness is as important as technical security. As I said in my other blogs, people are the last line of security, so Security Awareness Programs are crucial. In this blog, I’m going to discuss [...]

Read more...
Why is Security Awareness Training Crucial

Why is Security Awareness Training Crucial?

Why is Security Awareness Training Crucial? – In 2020, companies started to attach importance to security awareness training. In this blog, I’m going to introduce what Security Awareness Training is and why it’s important. 1 – What is Security Awareness Training? Why is Security Awareness Training Crucial Humans are the last line [...]

Read more...
Get Protected Against Phishing Attacks

What is a Phishing Attack & How To Get Protected Against It

What is a Phishing Attack and How To Get Protected Against Phishing Attacks – One of the biggest problems on the internet today is the lack of phishing awareness.  In this blog, I will talk about what is phishing and how to get protected against it. Also, we will [...]

Read more...
What are 2020 Phishing Attack Techniques

What are 2020 Phishing Attack Techniques?

What are 2020 Phishing Attack Techniques – Fraudsters started looking for different ways to scam people on the internet nowadays. Technology develops, so do their attacking techniques. Having information on how they attack  is the best way to prevent them. In this blog, I will be taking about the [...]

Read more...
Phishing Websites And How To Identify Them

Phishing Websites And How To Identify Them 

Phishing Websites And How To Identify Them – Phishing is quite common. One of the blogs we had written before covered how email users could face bad consequences with the click of a downloading/opening of attachments or websites sent by phishers. In 2020, phishing attacks rose even more than it [...]

Read more...
Protect Your Company Against Phishing

Protect Your Company Against Phishing Attacks in 2020

Protect your company against phishing in 2020! – Due to Covid-19 pandemic, criminals are targeting people working from home and phishing attacks have risen dramatically.  Employees working from home are vulnerable to cyber attacks since they can’t reach IT Teams directly, and they lack some security tools at home.  [...]

Read more...
Spear-Phishing Attacks Are on The Rise

Spear-Phishing Attacks Are on the Rise in 2020

Spear-phishing attacks are on the rise in 2020 – Many organisations have changed their working principles due to Covid-19, and they have adopted remote working principles. However, this has brought challenges since the employees can’t reach the IT Security Teams directly. In this blog, I am going to discuss [...]

Read more...