F-Blog: Phishing, Social Engineering & Awareness

What's new?

Our cybersecurity blog keeps you up to date on the topics of phishing, social engineering and awareness and informs you about innovative solutions in the field of IT security.

Awareness kommunizieren - doch wie wird das gemacht?
Security Awareness

How should one communicate a security awareness campaign?

Reading time: 3 Today, employees are an important factor in information security and require appropriate training. But how do you communicate training measures and security awareness campaigns that could be critically evaluated at first glance because of employee privacy?

LinkedIn-Datendiebstahl
phishing

IT- Seal's CEO David Kelm on the latest release of LinkedIn profile data.

Reading time: 3 In mid-April, it became known that cyber criminals had read the profile data of half a billion LinkedIn users and were now offering them for sale online. What is interesting in this case is that this form of data retrieval, also known as data scraping, is not illegal and LinkedIn is therefore not declaring the incident to be a data leak in the strict sense.

David Kelm explains in the interview why the publication of this data can nevertheless have fatal consequences for companies and how they can protect themselves against social engineering attacks.

Social Engineering Corona
phishing

The most successful social engineering attacks of the Corona crisis 2020

Reading time: 3 Cyber criminals use every current event to increase their attack potential. Just when people's need is greatest, profit-oriented criminals sense their opportunity. The audacity that cybercriminals have displayed so far during the pandemic shows a new level of ruthlessness.

Awareness Academy
Security Awareness

With the Awareness Academy to a sustainable security culture

Reading time: 3 Many IT security managers still face the challenge of sensitizing employees and colleagues to information security issues and thus avoiding misconduct and potential security incidents. But how can a sustainable security culture be established in the company?