Category: Tips

Tips on how to protect your data

Last year has shown us a tremendous amount of Data Breaches.  It is therefore more than advisable to focus on securing you data by using a layered approach (adding as...

Top 5 Bad Password Habits

Passwords are undoubtedly the core authentication layer on all of our accounts. Unfortunately, recent statistics show that accounts get compromised severely due to bad password habits. Using the same password...

Social Engineering: What is Tailgating?

What is tailgating? An attacker seeking entry to a restricted area, where access is unattended or controlled by electronic access control, can simply walk in behind a person who has...

Social engineering: Quid Pro Quo attacks

Oh, you got some issues with your computer – no problem, I will sort it out for you! – all I need is your credentials… Quid pro quo means something for something...

Social Engineering: What is baiting?

 What is baiting? A “lucky winner” gets a free digital audio player. In fact this offer compromises any computer it is plugged to – No so lucky huh !!  This...

Social Engineering: What is Phishing?

     WHAT IS PHISHING? Phishing (pronounced “fishing”) is a kind of identity theft which is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls...

What is Social Engineering ?

All humans make mistakes. One of the most intriguing findings from IBM’s “Cyber Security Intelligence Index” is that 95 percent of all security incidents involve human error. Many of these are...