Return to sender

Spam emails have been plaguing mailboxes for years, sometimes missing the junk folder and landing smack bang in the middle of one’s inbox. Cyber criminals use email as their main line of attack, due to it being such a vital part of an organisations’ inner workings.

As mentioned before, the statistics show that around 90% of phishing scams start with email and of those 90%, the most dangerous are the ones so sophisticated that they seem legitimate and may even pass through the filters. Some attackers don’t just send out blanket spam mails, some of these scams are targeted towards specific people within the organisation such as executives and members of the sales team.

The attacker even goes as far as to send the targeted email on a specific day such as payday or at month end so that it would be more believable. This is referred to as a spear-phishing attack. When an attack is targeted and believable there is a higher chance of success. This makes them dangerous. Having inline inspection and continually training your team on what to look for, you can avoid a costly mistake.

Read more: Return to sender

  • Hits: 66

Cyber Security Awareness Month

October is National Cyber Security Awareness month. After starting in the USA we are seeing growth in the acceptance of a month of security across Africa. This really got me thinking about what it entails to have a month dedicated to cyber security.

 As with any “awareness month” campaign, it is to bring cyber security to the forefront of your conversations and get you thinking about all things cyber safety, it’s about wanting to learn more about it and seeing where you or your organisation can set a good example, implement more practical cyber security protocols and take a moment to think of how different your environment is since partnering with cyber security professionals and how you could work together to beat the evolving cyber-attacks and breaches that occur.

Read more: Cyber Security Awareness Month

  • Hits: 70

Hey! Hackers! Leave our data alone!

A worrying number of large company breaches have splashed on the news scene recently. How can you as the customer feel safe sharing your personal details when it is just not being kept safe?

You are expected to without hesitation, give out as much credentials as possible, so then it would only be fair that the companies start to take their cyber security seriously in order to safely say that your information is in fact safe with them.

Statistics have shown that cyber breaches, big or small, have increased drastically since last year, with hackers becoming more sophisticated and bypassing the security measures that once stood steadfast.

Read more: Hey! Hackers! Leave our data alone!

  • Hits: 62

We’re only human after all, and well, that’s kind of the problem

Human error, according to Mimecast, is the cause of 95% of all security breaches. Whether it is laziness, lack of knowledge, workload, awareness or negligence. Exploiting standard human behaviours is what cyber criminals depend on and often it is how they infiltrate the most secure systems.

When someone uses the term “Human Error” it refers to the breach being caused by, you guessed it, a human! There are many ways in which you as the employee can infect your organisation without even realising that’s what you are doing until it is too late. Intentional and unintentional breaches often start and end between the chair and keyboard.

Something which may seem like a little thing can cause major damage; so let’s look at a few real-life examples.

Read more: We’re only human after all, and well, that’s kind of the problem

  • Hits: 63

With internet access comes great responsibility

Driving to work a week or two ago, the discussion on the radio peaked my interest. The presenters were discussing the fact that due to the ever-growing cyber world that in order to not have a mile-long address, individuals have started creating an email address for their new born child, and some people are even creating social media profiles for their children.

I started thinking that this is all good and well, but are you going to ensure that when your child is old enough to take over the accounts, that you have taught them how to be cyber safe?

Read more: With internet access comes great responsibility

  • Hits: 62
Copyright © 2018 J2 Software