E-Mail Phishing Attack Overview A social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about a company (your financial institution) or its computer systems. The attacker can look like anyone, and could fool you by saying they’re a repairman, or a new intern or employee, and they could actually have identification that says they work for your institution. They’ll…
In the past, having a secure website was not considered necessary for websites dealing with confidential, sensitive and financial information. Now a lot of things have changed. Almost everyday malicious cyber crimes are happening. Say, you are using your smartphone on a public WiFi connection in an airport. When you view some insecure website (those using only HTTP) you run a higher risk of having…
In the previous article, we talked about some major corporate security risks and their solutions. In this article, we are focusing on corporate security best practices. There are many; but like stated before, we will talk mostly about those which are applicable from our country’s perspective. 1. Encryption Encryption is a process of securing data, information, and device in a way to prevent being accessed…
Let’s start with few questions first before we dive deep into corporate security. Do you know it is extremely risky to have one or two familiar passwords that you use repeatedly for most, if not all, of your personal online accounts as well as on your corporate environment? Do know it is highly recommended that you don’t turn off the regular update feature of…