The Coronavirus Just Ripped Open Every Company’s Virtual Defences Before the pandemic hit, employees who worked remotely were usually given special work laptops with beefed up security and given strict guidelines that say they must only use a dedicated work laptop using a separate, secure wi-fi connection. They normally have to jump through multiple security hoops to even get past the welcome screen. For example, they must plug in a USB security stick to “unlock” work files.
Social engineering is a growing field and with your users at your last line of defence, security teams ought to be mindful of each user’s activity to interfere if needed. However, as an end user, you have a responsibility yourself to monitor your own activities. Here are some tips and tricks to start. Some Quick Tips to Remember: Think before you click. Attackers employ a sense of urgency to make you act first and think later in phishing attacks. When you get a highly urgent
According to a defence outlook report by Deloitte, the wealthier the nation, the more at risk a country is of cyber attack. The US, Japan, Britain and South Korea have been identified as some of the biggest targets. Not to mention, the recent cyber attack on the federal government may have exposed as many as 4.2 million current and former federal employees including investigations for security clearances and other job background checks. Moreover, In a report sponsored by Inte