

The initial stage where businesses should gain a clear understanding of the likelihood of an attack, what the attack might look like and how to maintain business continuity in the event of a breach. Click on this stage of the cycle to read more.
Once all assets and associated risks have been identified, assessed and prioritised, organisations must develop and implement an overarching strategy to safeguard the business. This encompasses aspects such as a security policy and associated frameworks, technical and operational strategies and business continuity. Click on this stage of the cycle to read more.
At this stage, it is essential to assess how well the business measures against a set of recognised criteria. A cyber security audit can be carried out to review the organisation, its systems and processes to identify threats, vulnerabilities. Click on this stage of the cycle to read more.
The detect stage is extremely important and likely to be the stage that resonates with most executives. Thinking like a hacker, knowing the latest techniques, weakest points of a business and managing that risk is vital if a business is going to successfully protect itself. Click on this stage of the cycle to read more.
The key aspect for any business is how to restore to a normal service operation as quickly as possible. There are 3 key aspects any business needs to prepare for to best respond to a breach. Click on this stage of the cycle to read more.
Google users appear to have been the latest victims of the most recent phishing attack, this time through their file sharing Google Docs service. Victims were sent a sinister email disguised as a fraudulent invitation to edit a Google Doc that appears to come from one of their contacts. The subject line reads “[Contact name] […]
Home | social engineering
by Tim Holman | May 8, 2017 | Article, Detect, Incident Response, Information Security & ISO 27001, Phishing Simulation & Social Engineering, Protect, Respond, Threat & Vulnerability Management
Google users appear to have been the latest victims of the most recent phishing attack, this time through their file sharing Google Docs service. Victims were sent a sinister email disguised as a fraudulent invitation to edit a Google Doc that appears to come from one...by Tim Holman | May 2, 2017 | Article, Information Security & ISO 27001, Phishing Simulation & Social Engineering
Last month, the papers reported that two major US technology firms were deceived by Evaldas Rimasauskas, a Lithuanian criminal, into sending him $100 million through an email whaling scam. It has just been confirmed that Google and Facebook were the two companies that...Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.