Cyber Risk Aware Blog

Phishing Simulations – Prepare with Realistic Attacks

[fa icon="calendar'] Dec 20, 2017 6:00:00 PM / by Stephen Burke

Phishing Simulations – Cyber Risk Aware

Phishing attacks are quite possibly the most common form of commercial cyber-attack and one which can entirely bypass all the electronic defences you have set up. In 2016, it is estimated that nearly 100,000 phishing attacks targeting companies happened each month, and further, it's an attack type which can be launched at any company regardless of size or prominence.

Read More [fa icon="long-arrow-right"]

EU Businesses: Will Your Human Security Be GDPR-Ready In 2018?

[fa icon="calendar'] Dec 18, 2017 2:01:00 PM / by Stephen Burke

GDPR + EU BusinessesCyber Risk Aware wants to ensure every business in the EU is focusing on the most important element of cyber-security while complying with the upcoming GDPR - the human element.

Read More [fa icon="long-arrow-right"]

Your Boss Just Asked For Protected Data... But Is It Actually Your Boss? Beware of Business eMail Compromise & CEO Fraud!

[fa icon="calendar'] Nov 9, 2017 6:00:00 AM / by Stephen Burke

There's a new type of cyber-crime on the rise, one which is not getting nearly as much public exposure as methods such as ransom ware: Business eMail Compromise and CEO Fraud. According to FBI statistics, Business eMail Compromise has seen an increase of over a thousand percent since 2015, and it is quickly growing to be one of the single most costly forms of attack a company can undergo. Worse, this is a style of attack which is based mostly in classic social engineering techniques.

Read More [fa icon="long-arrow-right"]

Welcome To the New Cyber Risk Aware Website!

[fa icon="calendar'] Nov 6, 2017 5:00:20 PM / by Stephen Burke

In just a short amount of time, we at Cyber Risk Aware have established ourselves as being one of the frontrunners in a new form of network security. We don't focus on technological solutions; we focus on the human element. When 95% of successful cyber-attacks involve a degree of human error, it's clear that even the most well-engineered (and expensive) high-tech security can be subverted with a single "oops."

Read More [fa icon="long-arrow-right"]

The Threat from Ransomware Continues to Grow. Are You Keeping Your Organization Safe?

[fa icon="calendar'] Oct 27, 2017 7:54:21 PM / by Stephen Burke

Numbers are in from multiple sources, including Kapersky and Symantec - malware activity continued to grow in Q2 2017, and ransomware continues to be the most popular attack type among cyber-criminals.

Read More [fa icon="long-arrow-right"]

Email Phishing on the Rise as Latest Data Shows Unsafe Emails Pass Through Security Systems

[fa icon="calendar'] Oct 24, 2017 3:12:11 PM / by Stephen Burke

At Cyber Risk Aware, the latest data we’ve seen highlights the need for more work on the latest security systems to prevent email phishing scams. The test data from Mimecast Limited shows that, of 45 million emails passed through by common email programs, nearly 31% were unsafe.

Read More [fa icon="long-arrow-right"]

Employee Security Awareness Training | Cyber Risk Aware

[fa icon="calendar'] Oct 16, 2017 7:11:07 PM / by Stephen Burke

By learning more on information security, employees can help to protect an organisation and its customers. This level of training is initiated from the top-down. Business leaders must build training programs that provide each employee the level of security awareness that can protect the organisation moving forward. To help guide companies during this process, our Cyber Risk Aware team highlight the process for building an employee security awareness training program.

Read More [fa icon="long-arrow-right"]

Experts Highlight Six Psychological Influences on Cyber Security

[fa icon="calendar'] Sep 13, 2017 7:28:51 PM / by Stephen Burke

In managing your business’s cyber security and making effective changes to your cyber security awareness training, it’s important to know what influences employees to make decisions that impact your business’s security. “Influence: Science and Practice” by Robert Cialdini described six principles that can be used by any individuals or groups who want to influence the behavior of others. And so, within this post, our team at Cyber Risk Aware present a guide on the six psychological influences on cyber security.

Read More [fa icon="long-arrow-right"]

Phishing Alert: Hurricane Harvey Disaster Relief Fraud

[fa icon="calendar'] Aug 28, 2017 11:59:00 AM / by Stephen Burke posted in Phishing, Disaster Relief fraud, Social Media Scam


Hurricane Harvey has hit the U.S. State of Texas hard, the most powerful storm to make landfall in the U.S. for over a decade and create what has been described as a 500 year flood. At times like this decent human beings want to help each other. However, for others in society namely "cyber-scum" they are exploiting this disaster and human goodness. 

Read More [fa icon="long-arrow-right"]

A Look at the Latest Cyber Risk Management Guide

[fa icon="calendar'] Aug 24, 2017 4:00:00 AM / by Stephen Burke

Gaining an understanding on the methods employed by cyber criminals, companies and their team members can reduce the risk of cyber-crime to their organization.

The Cyber Risk Aware team has decades of experience within the cyber risk management field, and within this post, we present several tips for minimizing the potential dangers of cyber-crime to your organization.

Read More [fa icon="long-arrow-right"]