Deltaspike

library

They’re only human after all…

IBM states that 60% of all cyber attacks are a direct result of insider attacks – caused by employees within an organization with malicious intent. While you might be right in assuming that this will not be the case in your company, with only a few people having access to your systems, your employees can still be responsible for potential cyber attacks, unwillingly and unknowingly.

DO’s and DON’Ts of Social Media Screening

After the initial screening is done and a few potential candidates are shortlisted, the next thing to tick off is the background checks. Companies usually refer to ex-employers and referees for validation. Most often than not we tend to look them up on LinkedIn to verify their corporate information

What Is A Botnet?

Malicious actors build botnets by infecting connected devices with malware and then managing them using a command and control server. Botnet architecture has evolved over time. the bot herder (the person controlling the botnet) to perform all control from a remote location, which obfuscates their traffic.

Social Engineering : Why You are at Risk

Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.

The Importance of Security Standards

Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.

Zero Trust Architecture 101

Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.

CSRF Protection 101

Cross Site Request Forgery (CSRF) is an attack where the hacker manipulates the user to carry out the attack by using the legitimate URL and the hosted website.