Remove redundant e-mail accounts and access to reduce risk
There are of course many aspects to managing data and cyber security in an organisation and one of the simplest and most often overlooked ones is that of identity and access management (IAM).
Basically, IAM is controlling what, how and when users access an organisation’s resources.
Do’s and Don’ts of Password Security
It goes without saying that weak passwords are a fundamental aspect of digital security breaches which are not going away any time soon. And as phishing attacks become more sophisticated, victims’ passwords are getting hacked more often after they unintentionally give clues to their supposedly secret sets of letters and numbers when baited to reveal them in such attacks.
Cyber-crime, the new scourge
At the recent Cyber Cerebral South Africa Summit 2019, Advocate Jacqueline Fick, CEO of Viz Strat Solutions, outlined the scourge of cyber-crime:
“WHEN dealing with cyber-crime we need to understand that it is a borderless crime and that makes it extremely difficult to successfully investigate and prosecute these types of crimes.”
The danger of impersonation attacks
Impersonation attacks are emails that attempt to impersonate a trusted individual or company to gain access to corporate finances or data and are typically done using phishing (or spearphishing when it’s targeted at one particular individual). Email impersonation attacks are usually designed to trick recipients into making fraudulent financial transactions by pretending to be from someone they’re not.
Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.
The Cybervision Team