Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
Document, memos, email and contacts can be stolen if you leave your phone unlocked. It is important to guard the information. Always keep your phone locked when you’re not using it.
Some platforms and websites post more information about you than others, like for example your workplace. Commenting or posting in a hurtful way might damage the reputation of your workplace and distress your fellow coworkers.
Using a privacy screen is a very affordable way to increase your security dramatically when working outside of your office.
Sometimes when you receive links that look authentic, there can be a minor error that can be easy to miss to trick you into clicking and visit sites that can be dangerous.
Doublecheck Before You Trust
There is always a possibility that someone has been “listening in” on your email conversations, jumping in when you least suspect it and fooling you into doing something you should not do.
If you must deliver confidential information to another person or entity, be extra careful who you deliver it to and if the recipient has the authority to access the information.
Processing of personal data revealing sensitive information is only allowed under very strict circumstances, described in Article 9 of the GDPR.
You should be aware that there might be a malware installed on your mobile where they can turn on your camera and microphone to listen in on your conversation.
It is very easy for a hacker to set up a Wi-Fi access point, but if you connect, much of your communication can be monitored or even manipulated.
Often confidential information leaks out because email senders are in a hurry or distracted and select the wrong recipient.
The main risk factor when using a networked printer is that if you select the wrong printer, confidential material can reach unauthorized eyes, inside or outside of the company.
Check Account Number
Fraudsters might try to sneak a bogus invoice into your accounting department.
Valuables in the car
Valuables in cars are not only your credit cards or wallets. If you are trusted with confidential information on medias or printouts, leaving them in an unsupervised car is not safe.
Defend your organisation from the cyber security risk posed by unaware employees - which currently provide the most effective ways for hackers to get into your systems
Keep your organization safe by turning your employees into your cyber security defence force. Short and effective training for maximum impact in minimum time and minimum interruption to productivity. Easily integrate content into your organisation’s LMS system or we can set you up with our LMS partners Actually make security awareness training interesting - fun even!
You know that even with the most state-of-the art security technology available, your organisation isn’t secure unless you address the human factor. Let us help you build an organisation-wide cyber security defence force!
Training and Human Resources Professionals
Easily deploy the most effective security awareness training in your organisation. Constantly updated. Interesting and effective. Let us help train your employees in cyber security awareness.
Avoid system downtime due to a wide range of cyber security threats with accompanying workload of system recovery. With cyber security aware employees you can get on with building your IT infrastructure - not rebuilding.
Simply and effectively comply with article 9 of GDPR on “awareness raising and training of staff”.
Build an effective employee defence force against the financial and reputational business losses that come from data leaks, financial scams, your business being held ransom by hackers and other cyber security threats.
Minimise your organisation’s exposure to legal damages due to employee negligence when it comes to cyber security and data handling.