Category : Informative

Types of Malware
If there is one thing that can ruin your sense of security, it’s malware. It can ruin your day, your computer,...
READ MORE
What is the business impact of a Phishing Attack?
As discussed in our previous phishing article, phishing is an attack method that uses email campaigns and bogus websites to fool...
READ MORE
How do you prevent Phishing Attacks?
Phishing attacks are the cause of a significant number of breaches. It’s the email with the sense of urgency, that email...
READ MORE
Types of Phishing Attacks
Introduction There are several types of phishing attacks with some targetting the masses while others target the most senior staff in...
READ MORE
What is the purpose of an Entitlement Review?
Most established organizations have employees who have been there forever, or at least, many years. During that time, these individuals have...
READ MORE
What is the Principle of Least Privilege?
The Principle of Least Privilege (PoLP), refers to the theory and practice of restricting access rights for users, accounts, and computing...
READ MORE