5 COMMON TIPS TO IDENTIFY PHISHING EMAILS

A phishing email is the most common way that is used by hackers and scammers to get hold of a person’s or an organization’s most sensitive and personal information. They do this via sending you emails containing links leading to malware, attachments that can drop viruses on your computers, etc.

Continue reading 5 COMMON TIPS TO IDENTIFY PHISHING EMAILS

Patch the weakest link or WannaCry : Option is ours

The eve of 12th May left the security gurus perplexed once again as the massive ransomware attack shook the world across the globe. The LinkedIn feed started with the news of NHS being impacted in England and over the next few hours ultimately all forums were flooded with news of “WannaCry” leaving the organizations cry for their critical data across the globe.  According to BBC, ransomware encrypted data on at least 75,000 computers in 99 countries on Friday. Continue reading Patch the weakest link or WannaCry : Option is ours

Ingredients for Designing a Successful Security Awareness Campaign

Security Awareness across the enterprise has always been a debatable issue. There would hardly be any CISO/CIO who would deny the role of security awareness, yet awareness gets the least eyes and attention of the security executives. Some blame the lack of resources, others say it is the responsibility of HR department, a few claim it has no benefit and that they simply have no time for it while majority is too busy in procuring and installing technology solutions. Continue reading Ingredients for Designing a Successful Security Awareness Campaign

Panama papers; Why data leaks will continue to happen?

The release of sensitive information to the public by individuals who are sometimes called whistleblowers and dubbed traitor or hero, is termed to be a data leak.

The most notable data leaks in the world include those facilitated by Wikileaks that showed the inner workings of US diplomacy, while the NSA files leak revealed that the NSA extensively tapped into the communication systems of American citizens and made use of court orders to coarse network providers to turn in the call, messaging and browsing data of its users.

Now, the Panama Papers is another notable leak in world history. A collection of 11.5 million files leaked from the database of the world’s fourth biggest offshore law firm, Mossack Fonseca. The Panama Papers reveals the task evading practices of the rich, who create offshore companies in tax havens around the world.

Continue reading Panama papers; Why data leaks will continue to happen?

INFOGISTIC Appoints Hamed Diab (Ex McAfee Regional Director) as Board Member for PhishRod in Middle East, Turkey & Africa

INFOGISTIC, a leading information security company and provider of PhishRod, a security behavior management & phishing simulation service has appointed information security veteran Hamed Diab as the senior board member in the META region (Middle East, Turkey & Africa).

3193-hamed-di_xlarge

Hamed brings in over 20+ years of experience in cyber security, strategy, leadership and business planning with leading IT companies in the world. Besides being on the board of PhishRod, Hamed is currently serving as a Regional Director for Middle East Turkey & CIS countries (Common Wealth of Independent States ) with ForeScout. Prior to this, Hamed has served with Intel Security (McAfee) as Regional Director for Middle East & North Africa and was instrumental in McAfee’s business growth in the region. He also held key positions with 3COM, Hewllet-Packard and COMPAQ during his career.

As organizations prepare to take on the battle against Phishing, PhishRod will certainly benefit from Hamed’s vast experience of the cyber security industry in the region.

For further details on PhishRod, please visit www.phishrod.co