Blog

cybersecurity phishing awareness training for employees

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 9, FAKE PUBLIC WI-FI

PUBLIC WI-FI SECURITY: HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 9, FAKE PUBLIC WI-FI Try our phishing simulation software for free. In Episode 9, Tom Freemont, the CEO of Pro Connect appears on Power Brunch Business News.  As he does, his stock price plummets nearly 40% as investors find out that [...]

Read more...
2020 Phishing Trends Report

2020 Phishing Trends Report

In 2020, we identified and analysed 410,000 of phishing email data to reveal the key points forming success of the phishing attacks and published 2020 Phishing Trends Report. This report will help security leaders and IT practitioners gain a better understanding of vulnerable industries and departments against a phishing [...]

Read more...
phishing awareness training

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 8, CATFISHING

Get in touch with Keepnet for the best phishing awareness training. In Episode 8, Keith falls into a Catfishing scam through an online dating website.  Online dating scams are extremely common and relatively easy to pull off for the hacker.  They use peoples emotions to draw them in, then use their [...]

Read more...
Free cybersecurity awareness training

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 7, W-2 HEIST

Free cybersecurity awareness training – want to try for free?  As we saw in the W-2 Heist Episode, a bank heist brought together a bank robber and a beautiful computer hacker who called herself a “Skacker” (Half Scammer, Half Hacker)  The skacker, while being held hostage explains the low risk and high rewards [...]

Read more...
cyber security awareness

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 6, HOSPITAL HIJINKS

Cyber security awareness – How it really happened: Ninjio season 1, episode 6, hospital hijinks As we saw in the Hospital Hijinks Episode, Michael had a dream that he clicked on a link in a suspicious email that installed the necessary software to launch a Ransomware attack.  As a result of doing this, [...]

Read more...
Keepnet Labs Elasticsearch

Keepnet Labs Elasticsearch Introduction

Keepnet Labs Elasticsearch Introduction Elasticsearch is an allocated search and analytics engine based on the Lucene library. Logstash and Beats help to get, aggregate, and improve your data and store it in Elasticsearch. Kibana allows you to interactively search, see, and distribute insights into your data and control and watch [...]

Read more...
insider threat statistics

What Are Insider Threats and How Can You Mitigate Them?

An insider threat is a security threat that arises from inside an organization which generally includes a current or former worker or partner who has the ability to obtain to sensitive information within the organization, and abuses this role. Today, most of the security actions serve for external threats [...]

Read more...