F-Blog: Phishing, Social Engineering & Awareness
Our cybersecurity blog keeps you up to date on the topics of phishing, social engineering and awareness and informs you about innovative solutions in the field of IT security.
Reading time: 3 Today, employees are an important factor in information security and require appropriate training. But how do you communicate training measures and security awareness campaigns that could be critically evaluated at first glance because of employee privacy?
Reading time: 3 In mid-April, it became known that cyber criminals had read the profile data of half a billion LinkedIn users and were now offering them for sale online. What is interesting in this case is that this form of data retrieval, also known as data scraping, is not illegal and LinkedIn is therefore not declaring the incident to be a data leak in the strict sense.
David Kelm explains in the interview why the publication of this data can nevertheless have fatal consequences for companies and how they can protect themselves against social engineering attacks.
Reading time: < 1 IT-Seal is committed to a good coexistence and constructive interaction between all people. In this context, we point out in this article a possibility to defend oneself against hate and agitation on the Internet.
Reading time: 3 Cyber criminals use every current event to increase their attack potential. Just when people's need is greatest, profit-oriented criminals sense their opportunity. The audacity that cybercriminals have displayed so far during the pandemic shows a new level of ruthlessness.
Reading time: 3 Many IT security managers still face the challenge of sensitizing employees and colleagues to information security issues and thus avoiding misconduct and potential security incidents. But how can a sustainable security culture be established in the company?
Reading time: 3 Phishing simulations are now used in many organizations for security awareness training. Although they need to be handled with care, many information security officers (IT SIOs) and CISOs choose to use them anyway. Why?