A recent survey conducted by Ipsos reported that more than half of all C-suite executives (C-Suites) (53%) and nearly 3 in 10 Small Business Owners (SBOs) (28%) who suffered a breach in 2019 identified human error or accidental loss by an external vendor/source as the cause of the data breach.
FUN. ENGAGING. MEMORABLE.
As internet security infrastructure becomes smarter and more difficult to penetrate, hackers have made the migration toward phishing attacks as the cyber-criminal weapon of choice because they exploit the seeming weakest part of any security system – humans!
If you have ever filled out a complete profile on LinkedIn (because you wanted to reach that 100% on the profile completeness) or finished a never-ending survey because you were promised a prize at the end, you’ve been gamified.
In our data-driven world, most organisations are at least partially dependent on a measure of electronic storage and networking. Perhaps out of experience, large organisations are generally aware of the need for effective cyber security frameworks including firewalls, access and awareness training, and anti-malware systems. Educational institutions, however, tend to be somewhat behind the curve, when it comes to tightly securing their data-verse. Recently, ethical hackers while testing the computer security of university networks discovered that they were able to successfully breach networks in less than 2 hours by using spear-phishing attacks to gain access to sensitive information. Well over 50 universities across the UK were a part of the test and in almost every case, testers were able to acquire domain-level administrator access used to control systems and gain complete unauthorised access to system information.
EU member states are now covered by the General Data Protection Regulation (GDPR) which is basically a law that protects the personal information of individuals within the EU and how they are used. GDPR is important for organisations around the world because it affects everyone who does business or communicates with individuals in the EU member countries. It is arguably the most important government regulation on data protection and data privacy rights in the last 20 years.
Everything has a cost, and that does not exclude free public WiFi connections.
Some weeks ago, there was an attempted hack into the phone contact list and emails of some UK MPs. This prompted the deputy chief whip Christopher Pincher to issue a warning to his colleagues, imploring them to;“Please be wary of texts and/or emails purporting to come from colleagues asking you to provide overseas contact details and/or asking you to download a secure message app.”
At Cyber Risk Aware (CRA) we do not only enable you build a human firewall that functions as a last and critical line of defense on cyber-attacks, we also ensure that you and your organisation are able to thoroughly meet your legal and regulatory compliance. We do this through our industry-leading and most user-friendly integrated Security Awareness platform which we are constantly improving to best suit your ever-evolving needs.
We have been busy delivering on the additional capabilities that we believe would enable you extract more value from the CRA platform, as well as some other updates that some of you outrightly asked for.