by Piers Shearman | Nov 18, 2020 | General
Vishing (voice phishing) is a type of phone fraud which use social engineering to extract information or credentials from a victim. Attackers often use a pretext to misrepresent their authority or position in order to trick the victim into compliance. Attackers...
by Lisa Forte | Oct 12, 2020 | General
Getting your staff to change their security behaviour It is often submitted that fear is bad. Actually, from a behavioural science perspective we know fear is the most effective tool for stimulating behavioural change. Fear of crime is necessary but not sufficient to...
by Piers Shearman | Oct 7, 2020 | General
Cyber Security Awareness Month Special: “Hacked” What would you do if your company was hit by a cyber attack? Do you have a plan? A crisis management team in place? Many companies don’t have a plan or haven’t tested that plan. For Cyber...
by Piers Shearman | Sep 30, 2020 | General
October is ECSM, a month-long European event promoting good cyber security practices and safety. This years themes are: Digital skills: personal data protection, cyber bullying and cyber stalking establishing good practices online. Cyber scams: cyber threats such as...
by Piers Shearman | Sep 22, 2020 | General
by Lisa Forte | Sep 19, 2020 | General
How pre-election manipulation goes deeper than social media. A critical moment is almost upon us. It will be a test of the protections we’ve tried to implement to protect our democratic freedoms. 2020 will once again see the spotlight hit the US elections, the latest...
by Piers Shearman | Jun 1, 2020 | General
What happened? Disgruntled former IT admin Charles E. Taylor quit his job at an unnamed Atlanta based distribution company before going on a sabotage spree costing the company $800,000 USD to redress. Taylors “multi-stage sabotage campaign” involved...
by Lisa Forte | May 18, 2020 | General
178: Office pranks, meat dresses, and robocop dogs May 14th, 2020 | 50 mins 42 secs coronavirus, data breach, email storm, hacking, k2, lady gaga, microsoft, mountaineering, nuclear waste, onkalo, reply all, social distancing, sourdough Graham shares stories of...
by Lisa Forte | May 3, 2020 | General
What is Permissions Creep? Permissions Creep, also known as privilege creep, is what happens when we move between roles in an organisation and keep the access or permissions of the previous role. Privilege Creep example: Let’s imagine you have been hired by a...
by Piers Shearman | May 1, 2020 | General
As several businesses ditch the popular conferencing tool, Lisa Forte, partner at Red Goat Cyber Security, calls for calm Zoom, the free to use video conferencing app, has exploded in the last month. It quickly became a household name and more than doubled its share...