<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

Fairdinkum Blog

Data Breach Scenario: Malicious Software

Posted on June 19 , 2018

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article we will focus on the malicious software that makes organizations vulnerable.

Read more »

Criteria for Evaluating EMM/ MDM Solutions

Posted on June 14 , 2018

Enterprise Mobility Management (EMM)/ MDM

Read more »

Is It Time For A Network Security Audit?

Posted on June 07 , 2018

What is a security audit and how often should your company issue a routine check? Just like your annual checkup, it is wise to do the same for your network. Fairdinkum recommends that a company undergo a routine security audit once every quarter.

If you don't know where to start, start here by checking out our security audit checklist below!

Read more »

How to Identify a Phishing Email

Posted on June 05 , 2018

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

Read more »

"Petya": What We Know So Far

Posted on June 27 , 2017

It has been exactly 46 days since the news of the NHS hack broke and now we are faced with another ransomware attack.

Read more »
Page 6 of 12 « 1 ...
4 5 6 7 8