Cybersecurity Tools

Catches of the Month: Phishing Scams for November 2023

Welcome to our November 2023 catches of the month feature, which examines recent phishing scams and the tactics criminals use to trick people into compromising their data. This month, we look at a recent phishing attack on Booking.com, an NCSC warning about Black Friday scams, a Google Cloud report into how AI will drive phishing in the future, and a Europol and Eurojust takedown of a phishing gang. You can find everything you might want to know about phishing on our website. Booking.com confirms phishing attack Booking.com has apparently confirmed what the information security press has known for some time: another

The post Catches of the Month: Phishing Scams for November 2023 appeared first on IT Governance UK Blog.

Cybersecurity Tools

What you need to know about AI (and it might surprise you)

Sergey Shykevich has a military intelligence background and is an experienced cyber threat Intelligence manager with a proven-track record of success. He has a profound knowledge of cyber and fraud oriented threats, and wide experience in building intelligence deliverables and products for companies of different sizes and in various industries. In this expert interview with […]

The post What you need to know about AI (and it might surprise you) appeared first on CyberTalk.

Cybersecurity Tools

Assigning User Privileges in Heimdal [It’s Easy] 

Managing user privileges is a critical task for any organization. This article aims to guide you through the process of assigning user privileges in Heimdal, ensuring a secure and efficient management of your cybersecurity infrastructure.  Key Takeaway Summary  Understanding User Access Control in Heimdal; Setting Up and Assigning User Privileges; Analyzing and Responding to User […]

The post Assigning User Privileges in Heimdal [It’s Easy]  appeared first on Heimdal Security Blog.

Cybersecurity Tools

The Challenges of Adopting ISO 27001 Controls: A Comprehensive Guide for CISOs and IT Administrators 

When it comes to information security, ISO 27001 is of paramount importance. As CISOs and IT administrators, you’re likely familiar with its significance. However, the journey from understanding to effectively implementing ISO 27001 controls is not without challenges.   This article aims to provide a deep dive into these controls, emphasizing their critical role and offering […]

The post The Challenges of Adopting ISO 27001 Controls: A Comprehensive Guide for CISOs and IT Administrators  appeared first on Heimdal Security Blog.

Cybersecurity Tools

How to Implement an Effective Mac Patch Management Strategy 

An effective Mac patch management strategy involves following a series of well-planned steps and best practices. Patch management strategies are not just about bug fixes, closing vulnerabilities, and improving system performance. Meeting compliance requirements is also on the goals list.  Mac patch management is a complex, resource-consuming process. With a variety of macOS devices, working […]

The post How to Implement an Effective Mac Patch Management Strategy  appeared first on Heimdal Security Blog.

Scroll to Top