Please consider updating your browser. Some parts of the website may not function as intended.

4 Classic Social Engineering Attacks

Classic Social Engineering Attacks

Social engineering can be summed up as hacking the human. Simply put it is the action of leveraging human frailty – our reaction to urgency, to compliance with perceived figures of authority, to taking information at face value – and using it against us as a way of eliciting information or performing unauthorised actions. Social […]

Who’s Zoomin’ Who?

Zoom unsecure

Video conferencing has never been more popular, let’s have a look at the options and examine some of the security implications. Possibly you, like me may have been a bit disappointed to see that when it comes to video conferencing his taskforce, our Prime Minister simply used Zoom like many of the rest of us. […]

Beware the Coronavirus Phishing Attacks

Coronavirus Phishing

On top of everything else to contend with you also need to be especially vigilant to COVID-19 based phishing emails – we talked about phishing emails generally in a previous blog post “Why you should fear the spear” I’ll refrain from expressing fully the contempt that all decent thinking people must feel towards those wishing […]

Don’t be Vulnerable to Vishing – Identify and Mitigate Risk

Vishing

In this post, you’ll learn why vishing is successful and what you can do to mitigate the risk of being vished. Vishing is a form of social engineering. Much like phishing, it can be used to manipulate people into giving away usernames, passwords and sometimes bank details. Vishing: Exploitation by voice commands Vishing is the […]

As a nation, are we cyber security aware?

In the following blog post, we are going to shine a spotlight on the general cyber threat landscape in the UK, examine the most prevalent forms of attack and look at the detrimental implications these attacks have on organisations. After reading this post, we hope you’ll be able to see where your company figures in […]

Spear Phishing – Why you should “Fear the Spear”

SPEAR PHISHING, WHALING, BUSINESS EMAIL COMPROMISE AND CEO FRAUD IS ON THE RISE AND COSTING COMPANIES BILLIONS Have you heard of the acronym: FUD? It stands for ‘Fear, Uncertainty & Doubt.’ Unfortunately, the Information Security industry has a bit of a bad rep for selling their services off the back of FUD: “Don’t want the […]

Why Information Security Awareness Training is Important

a young male using the eRiskology Information Security Awareness elearning portal

Good information security awareness training can turn your workforce into the strongest line of defence instead of the ‘weakest link’.  Around 70 – 80% of all breaches can be attributed to the human element, yet companies often focus their resource of software-based security solutions. Where do we start? If you haven’t already found our post […]

Data Hack: Was Bezos a Bozo?

Picture of a clown with balloons with text on them that relate to the Bezos hacking events

We doubt it, he probably just needs some awareness training You’ve probably heard about Jeff Bezos’ personal and sensitive media being bandied about by the National Enquirer. No need for us to dwell on that, or comment on the US political machinations that could be behind it. Instead, prompted by an article by Rory Cellan-Jones […]

Bed, Breakfast and a Breach – Marriott Data Breach

500 million customer records breached at Marriott Hotels

500 Million records in the Marriot Data Breach I imagine you have all now read with dismay but possibly not that much surprise at the latest ‘megahack’ over at Marriott Hotels. We’re not going to bombard you with more of the same. Instead, we thought this is a good opportunity to highlight a very unwelcome […]

The Most Effective Social Engineering Attacks of 2018 [Infographic]

Social Engineering Attacks Social engineering. Nowadays it’s everywhere, and you couldn’t even know about it. Where the normal idea of a “hacker” is someone sitting in their room with a dark hoodie on looking at multiple monitors of code, social engineering is the hacking of humans. We have created this infographic to detail some of the […]

Do NOT follow this link or you will be banned from the site!