How to Spot a Business Email Compromise Attack
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticleSocial Engineering: Attacks, Techniques, and Countermeasures
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticleCyber Tools: Six Cyber Security Solutions to Know About
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticleVPNs: Security Best Practices for Businesses
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticleThe real cost of a data breach in 2022
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticlePassword Spraying Attacks: Tips for Detection and Prevention
Between brute force, credential stuffing, and password spraying attacks, password security is still top of mind for global IT professionals. Cyber criminals have become more skilled at cracking...
View ArticleThreat Hunting: An essential part of your cyber defence
Today’s digital landscape is constantly evolving. At the same time, cybercriminals are becoming more sophisticated. This means it’s increasingly important for organizations to develop an effective...
View ArticleSimplify with Cyber Security Fundamentals
One of the biggest, most consistent traps I’ve seen organizations fall into is making security overly complicated. It’s understandable—security as an industry is still relatively new and most of us...
View ArticleWhat Drives Us Crazy: The Blinky Lights Syndrome
When Secure IT Systems decided to move away from the MSP space to focus solely on Information Security, it was to help try to fix a broken information security industry. One of the ways it’s broken is...
View ArticleWhat is InfoSec: The 5 W’s of Information Security
When we describe what we do at Secure Shield almost every time the reply is “so, you mean cybersecurity?” Well, Kind of Information Security can be confusing to some people. Okay, maybe most people....
View ArticleInformation Security and Compliance Explained
A basic understanding of information security and compliance is fundamental to the success of thousands of organizations. Unfortunately, the two terms are far too often misunderstood, mixed up, and...
View ArticleScammers leverage CrowdStrike outage for phishing campaign
Threat actors are leveraging the global outage caused by a flawed update deployed to CrowdStrike’s Falcon sensor to target organizations with malware. Several cybersecurity researchers and agencies...
View ArticleSecurity Policies, Standards, Procedures, and Guidelines
Take a look at the terms “information policies,” “information procedures,” “information standards,” and “information guidelines.” Aren’t these basically the same thing? No, they are not and here’s...
View Article