Cyber Risk Aware Blog

Julie Lhanang

Julie Lhanang

Recent Posts

The Background and Evolution of Phishing

[fa icon="calendar'] Sep 4, 2018 11:46:00 AM / by Julie Lhanang posted in smishing, phishing email, Phishing Simulation, Security awareness

 

Mimecast have just released a new report which reveals an 80% increase in impersonation or Business Email Compromise (BEC) attacks.

Read More [fa icon="long-arrow-right"]

Introducing Smishing the latest addition to the CRA Platform

[fa icon="calendar'] Apr 30, 2018 12:30:00 PM / by Julie Lhanang posted in phishing email, security awareness training, Phishing Simulation

Information Security and SMiShing :

Read More [fa icon="long-arrow-right"]

Phishing Template Upgrade - Introducing New Sophistication Rankings

[fa icon="calendar'] Apr 19, 2018 8:44:21 AM / by Julie Lhanang posted in phishing email, Phishing Simulation, Phishing

Getting to know the new lure sophistication classifications, and how they can help your next campaign.

 

In 2017, Symantec reported that phishing rates had increased across most industries and organisation sizes. News sites consistently report on the biggest and scariest malware attacks and data breaches, and then ultimately attribute the increased susceptibility to one of many new phishing trends. But what in fact constitutes a highly-sophisticated phishing message? And how can this knowledge help you strategically plan and execute your next test campaigns.

Read More [fa icon="long-arrow-right"]

The Importance of Benchmarking your Security Awareness Training Programme for Risk & Compliance Reasons.

[fa icon="calendar'] Mar 13, 2018 12:37:00 PM / by Julie Lhanang posted in security awareness training, Phishing Simulation, GDPR, Staff Awareness

A company’s staff is the greatest untapped resource in the fight against cybercrime. Although research has shown that in 90% of successful cyber-attacks or more, there is an element of human fallibility involved, what those studies fail to mention is that a trained and vigilant staff could become the greatest barrier of defence against attack types: such as trojans, viruses, ransomware, and other electronic security threats.

Read More [fa icon="long-arrow-right"]