Blog

Quick updates

The explosions at the Nord Stream 1 and 2 gas pipelines in 2022 starkly highlighted the vulnerability of our underwater infrastructure. In addition to pipelines essential for energy supply, digital infrastructure is increasingly seen as a potential target for sabotage. Experts warn that digital infrastructure, such as undersea data cables, is a critical and vulnerable part of our modern society. Read more

NIS2 is the next major regulation after GDPR and NIS(1) that organizations need to contend with. Our goal is to shed light on this new directive with a realistic perspective, to determine its applicability to our average SME customer, and to explore how we can assist in compliance. Read more

The holiday season often brings the joy of unwrapping new gadgets, and one exciting addition could be a shiny new smartphone. However, before you bid farewell to your trusted old device, it's crucial to ensure a smooth transition, especially regarding your Multi-Factor Authentication (MFA) profiles. Read more

We start with the conclusion of this article because we cannot emphasize it enough. But, of course, we want you to stay interested and keep on reading. That is why we already reveal that we will provide you with a clear and comprehensible overview of the different forms of social engineering. We will also explain how you can minimize the risks for your company as much as possible. Read more

Don’t bite that phishing hook!

hackers-phishing-en
IT & telecom news / Solutions

Don’t bite that phishing hook!

Phishing, what is that again? Phishing is a form of online fraud in which cybercriminals try to get hold of the (bank) details, codes and credentials to their victims’ (bank) accounts. They do this using malicious e-mails, text messages, WhatsApp messages or social media messages containing a link to a fake website, a suspicious attachment or a request to download an app.

Research has shown that, without training, one in three European employees would be caught by a phishing email. After that first measurement, when employees had not yet received cybersecurity training, two more measurement moments followed. First an intermediate measurement, when employees had already been training for 90 days. At that point, the results were already much better, with an average falling from 29.9 percent (1 in 3) to 18.5 percent.

At the last measurement moment, training was attended at least on a monthly basis for one year. From that moment on, less than one in ten employees would fall for a phishing email (6.3 percent).

How does your organization perform?

Despite all (much-needed) IT security, it is often an employee who clicks on a wrong link, opens an unsafe attachment or worse, enters payment or login details on a rogue website. People therefore pose a major threat to the integrity of (company) data, not to mention the costs associated with data recovery.

With an initial audit and baseline measurement, we can analyze in detail how well your organization scores. With this information we can then define concrete action points or even roll out a training program for your employees.

Are you interested or do you want to know more about the possibilities? Let us know via the contact form below, or contact your account manager directly.

Source: ITdaily

How can we help? Get in touch with our experts.

Enter your details and we will contact you as soon as possible.


    We value your privacy and we only use the information you entered here in order to reply you.

    Or call us now!

    We are happy to discuss your project, in person or via video call. Request a free consult with one of our IT or telecom experts to get to know each other and to look into your particular situation.

    Stay updated on our news? Subscribe to our newsletter.