Will medical negligence apply in situations where health care providers have not taken sufficient precautions to enable recovery after a ransomware attack? Some thoughts on a recent situation in the United States.
Spear phishing relies on directly profiling a targeted person and social engineering nastiness. Attackers have shown “creativity” in adding extra oomph to spear phishing attacks to force a compromising incident.
Among its more than 900 resources for security awareness training, KnowBe4 offers a 12-episode video series about insider threats called The Inside Man. Wow. Just wow.
Clean up and sanitisation actions after an averted phishing scam. You’d better be doing something, and a warning email to staff alone is not good enough. Some ideas.
I didn’t practice a fundamental skill in a recent presentation. I should have done better. Reflections, and answering the question I didn’t answer on the day.
Visiting a web site and leaving a threat-ladened comment is a high-cost method of phishing.
If your account is compromised, Microsoft Search will provide much faster access to all the good and juicy stuff in your work. Safeguard your accounts, no exceptions.
Preparing for the DWCNZ in Auckland. I had two sessions – ROI of Office 365, and Safeguarding the Digital Workplace.
Office 365 offers an incredible selection of capabilities to drive productivity and collaboration, but the digital workplace is under attack. Malicious actors are seeking access to your information, your corporate secrets, your reputation, and ultimately, your corporate hoard of cash. You better be doing something to safeguard your digital workplace – both from malicious actors and to be compliant with new data protection regulations around the world.
Mobile devices as endpoints to corporate information have taken the world by storm. The “mobile first” mantra refers to the preferential use of a mobile device before a desktop or laptop. Have phone, will work (or even run the company). The potential of the device to enable new […]