Blog

The internet’s ‘father’ says it was born with two big flaws

Management Consulting, Training
Business Insider just posted an article that confirms something I have been saying for years. There is some contrary data though. We may be looking at a light version of rewriting history. Here are the highlights they started with: Vint Cerf, one of the creators of the internet, said the network had two big flaws when he launched it.The internet didn't have room for all the devices that would eventually be connected to it, said Cerf, now Google's chief internet evangelist.It also didn't have any built-in security protocols.Even though both shortcomings proved problematic, Cerf's not certain he would have fixed them if he had to do it all over again. Read the full article here....
Read More
Most Cyber Attacks are composed of 4 Stages…

Most Cyber Attacks are composed of 4 Stages…

Management Consulting, Training
Survey, Delivery, Breach and Attack… Security Controls at each stage of an attack, can reduce your organisations exposure to a successful cyber-attack, however your first line of defence is you employees, train them to be aware of cyber threats and this can reduce the likely hood of an attack… contact us now for a discussion on how we can help in training your .... HUMAN FIREWALL...
Read More
Increase in Office 365 Attacks and Data Breaches Should Be Expected as We Approach the 2019 Tax Season

Increase in Office 365 Attacks and Data Breaches Should Be Expected as We Approach the 2019 Tax Season

Training
Experts warn of uptick in phishing attacks against businesses leveraging Office 365 as the tax season begins, tensions run high, and opportunities to trick off-guard users will be plenty. Cybercriminals want two things to exist when they attack: First, they want a gullible victim who will fall for a scam email. Second, they want either an immediate payoff, or a quick way to gain access to data that will turn into money quickly. So, the combination of Office 365 users and tax season create a volatile and dangerous mix for businesses. Phishing scams related to taxes not being filed, unexpected refunds, changes to banking details, or huge tax bills are sufficient enough to get unsuspecting users to click on malicious links or attachments. And Office 365 can be the vehicle…
Read More

New Data Suggests that Negligent Employees May Be the Reason Data Breaches are So Successful

General, Training
When it comes to root causes of data breaches, it’s not your firewall, your endpoint protection, your antivirus, nor your patching that’s failing you; it’s your employees. Every security-minded organisation puts together a layered security strategy to deter, detect, and respond to cyber attack. A ton of time, budget, and resources is put into software solutions designed to keep up with the latest attacks, malware, and techniques. But what if I told you that your weakest link hasn’t been addressed? Click here to check the fully story out...
Read More