F-Blog: Phishing, Social Engineering & Awareness
Our cybersecurity blog keeps you up to date on the topics of phishing, social engineering and awareness and informs you about innovative solutions in the field of IT security.
Reading time: 3 Cyberkriminelle nutzen jedes aktuelle Ereignis, um ihr Angriffspotenzial zu steigern. Gerade wenn die Not der Menschen am größten ist, wittern profitorientierte Kriminelle ihre Chance. Die Dreistigkeit, die Cyberkriminelle während der Pandemie bisher an den Tag gelegt haben, zeigt ein neues Maß an Skrupellosigkeit.
Reading time: 3 Many IT security managers still face the challenge of sensitizing employees and colleagues to information security issues and thus avoiding misconduct and potential security incidents. But how can a sustainable security culture be established in the company?
Reading time: 3 Today, employees are an important factor in information security and require appropriate training. But how do you communicate training measures and security awareness campaigns that could be critically evaluated at first glance because of employee privacy?
Reading time: 3 Phishing simulations are now used in many organizations for security awareness training. Although they need to be handled with care, many information security officers (IT SIOs) and CISOs choose to use them anyway. Why?
Reading time: 5 To get protected against cyber attacks, it is essential to know how attackers proceed. Using the Cyber Kill Chain® designed by Lockheed-Martin1 , we can understand what methods cyber criminals use to smuggle malware into the company.
Reading time: 4 During the pandemic with the new type of a corona virus, many companies sent their employees to work from home or ordered so-called mobile working. Now that the initial escape from the office has subsided, many companies want to enable their employees to continue working from home. But which tool is the right one?