CATEGORY: Cybersecurity and
21.0 – Cybersecurity Incident & Risk
Cybersecurity incidents are now firmly at the top of international agenda because high profile breaches raise panics that hack attacks, and other security failures, could pose danger to global wealth. Home Depot and Equifax are among several recent organizations that have lost consumer data to cyber-criminals. In some organizations, cyber hackers stole money from user […]
19.4 – Staff Training
Countermeasure: Employee & Staff Training Employee and staff training on human security management is very important for overall protection. Employees who work remotely are becoming increasingly frequent, posing additional threats. The chance of remote employees’ systems being infected by a keylogger or other malicious code through a phishing and other attacks, and then spreading the […]
19.3 – Phishing & Countermeasure
The best way to get another person’s login credentials is by asking them. Though it sounds impractical and obvious, it is the most extensively used technique to get sensitive information. Phishing has become the Internet’s equal of asking for login credentials, and computer users fall victims every year to phishing frauds. Phishing is a criminal […]
19.2 – Dumpster Diving & Shoulder Surfing
Dumpster Diving & Shoulder Surfing Techniques Dumpster Diving Dumpster diving is the technique of looking in the trash for critical data that has not been correctly disposed of. While this technique may sound dirty, it is a very satisfying one. One possible reason for the extensive use of this technique is its non-technical temperament. Social […]
19.1 – Social Engineering Techniques
We all are aware of the type of attacker who leverages his technical skill to penetrate protected computer systems and compromise critical information. We hear such attack vectors in the news all the time, and we are motivated to counter their exploits by spending on new technologies that will boost our network security. Nonetheless, there […]



