Blog
Why Organizations Should Still Care About BYOD
The conversation on bring your own device (BYOD) in the workplace has been going on for a while and it’s obviously more a given in some sectors than in others. Opinions among security experts on whether or not BYOD is a good idea depend on who you talk to. What is clear is that organizations may want to at least consider a BYOD program. Why? Because not only do many employees use their personal devices for work anyway, studies show that they’re more productive when they’re allowed to.Though t
…
Dec 23rd 2022
Social Engineering Simulation Testing Tips
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim. Similar to phishing, the aim is to compel an individual to either provide information or take an action, which can be used for network penetration or identity theft. The problem is so pervasive, the IRS listed phone scams as n
…
Dec 23rd 2022
What is physical security?
Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.Physical security is often overlooked -- and its importance underestimated -- in favor of more technical threats such as hacking, malware, and cyberespionage. However, breaches of physical sec
…
Dec 23rd 2022
How to secure your computer from Hackers
When the glossy sheen of the World Wide Web started to dull – sometime in the mid-to-late 1990s – computer users were beginning to witness the downside of connectivity, and they did not like what they saw.Tons of spam washed over every email account, and computer viruses wreaked havoc on business networks. A terrifying criminal element emerged that extended the definition of thievery to include infiltrating your computer, stealing personal information, tricking you into revealing private data
…
Dec 23rd 2022
Top 10 Most Common Types of Cyber Attacks
A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems.1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacksA denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a lar
…
Dec 23rd 2022