A UseCase Series
Which two-step authentication has better security, a text message or an authenticator app?Answer: Both has its pros & cons. SMS: * Its convenient * Doesn't require a smartphone * Doesn't need any setup * Last of all, its a good "teller" when some one is trying to break in to your account. However, it can … Continue reading Two factor Authentication – which type?
What is the biggest cyber security threat to your business?Answer: There are many, however my thought always goes to "Phishing" Offenders are never going to stop finding any loophole that they would want to exploit. Because to them, every small piece of information they could find is a treasure in hand. No matter how many … Continue reading Common cyber security threat
Its not exactly the stealth mode
Basics to staying safe
What your phone knows about you?
Originally published at: https://www.todayslegalcyberrisk.co.uk/guest-writers/email-security-these-are-the-signs-you-should-be-looking-for/ Folks working in IT might be aware of how to spot the red flags on a spam/phishing emails and the ones who don't not so much. The lack of knowledge about cyber security is the reason why many of us are prone to cyber-attacks. To survive in this fast technology-pacing world, … Continue reading Email Security – These are the signs you should be looking for
90 percent of the attacks takes place because of phishing, that includes the lack of knowledge to spot a phishing email. Source: GettyImages Email is as important as any means of living in today’s “technological” realm. It is used for everyday communication across the world. Thus, it is necessary to understand the downside of it … Continue reading Phishing Awareness — Do not be victim of a scam. Learn to spot one.
When you walk into a coffee shop or a train station or a shopping mall, you see a pop up “Connect to free WiFi” and obviously you are tempted and you connect, without giving it a second thought. That’s where this new age’s is headed to and that is one of many reasons hackers take … Continue reading Do you connect to public WiFi? Then you need to know what you are risking.
Yes, your email accounts! Adversaries favorite way to doom. This post will give an insight to what to watch for or look for when handling emails! Dig in!