Ultimately criminals don’t want to waste time on targets that won’t be susceptible to their scams, so they use social engineering techniques to filter out the wary from the credulous. They don’t want to waste time on targets that have clearly invested money and effort in constructing effective cyber defences, so they focus on identifying those whose security ‘posture’ appears weakest (think of a burglar walking down the street looking for a property with an open window). …Continue Reading: Broken Windows in Cybersecurity strategy
Cybercriminals have always exploited human weakness to successfully execute cyber attacks. Ask any vendor what the weakest link in the chain was 15 years ago and they’d offer the human up for sacrifice…Continue Reading: Anti-phishing training: is it enough?
In 2018, only 9% of those vendors claiming to solve your cybersecurity woes and offering the best of class protection on the market, had protected their own domains with DMARC at a level sufficient to stop phishing attacks at the gateway or sweep to the spam folder…Continue Reading: Infosecurity Europe 2019: A-listers still failing to protect their domains
Of the 401 exhibitors at Infosecurity Europe 2019, it is believed that just 13 percent had actually executed full DMARC protection successfully so as to stop potential phishing emails at the gateway…Continue Reading: Research: InfoSecurity 2019 – Majority of exhibitors unprotected against email fraud