Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Phishing
You are here: Home \ Phishing
Posted on Thursday, April 9th, 2020 by
Cyberattacks have increased in frequency during COVID-19 and now more than ever is the time to consider going passwordless to be more secure. The password is a simple thing that is employed throughout our digital life, enabling us to access myriad online and company resources. However, a survey by Dashlane found that we each have,...

Topics: Coronavirus, COVID-19, Cybersecurity Posture, Office 365 Security, Phishing, Ransomware, Remote working, Uncategorized, wfh, Working from home

Posted on Tuesday, March 24th, 2020 by
What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health Organization (WHO) about the current COVID-19 pandemic. In reaction to this, companies across the world have fallen in line with health guidance on social distancing and...

Topics: Coronavirus, COVID-19, Data Protection Impact Assessment, DPIA, Pandemic Response Planning, Penetration Testing, Phishing, PIA, Ransomware, Remote working, Risk management, Social Engineering, wfh, Working from home

Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

Black Friday Shopping
Posted on Wednesday, November 20th, 2019 by
Many of us eagerly await the annual Black Friday offers to get a good deal on holiday presents (or gifts to self!). Unfortunately, Black Friday is also a great opportunity for cybercriminals looking to scam customers out of hard-earned money and valuable personal data.  As we prepare for Black Friday shopping, what should online shoppers watch out for and how can they protect themselves against scams?

Topics: Phishing, Security Practices, Social Engineering, Tips & Tricks, Uncategorized

Deepfakes and Cybercrime
Posted on Thursday, November 14th, 2019 by
How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?  Back in 2018, researchers found 14,698 deepfake videos online. But what is this phenomenon about and how will it affect businesses and individuals in the years to come? 

Topics: Artificial Intelligence, Cybersecurity Posture, Digital Transformation, Phishing, Social Engineering, Trends & Technologies, Uncategorized

Social Engineering
Posted on Thursday, October 3rd, 2019 by
How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and resources against the scourge of social engineering-based cyber-attacks, including security awareness training, phishing simulation, cybersecurity posture assessments etc.

Topics: Cybersecurity Posture, Managed Security Services, MSS, Phishing, Social Engineering, Tips & Tricks, Uncategorized

Social Engineering Examples
Posted on Thursday, September 26th, 2019 by
What are some of the most common social engineering examples and attack techniques that individuals and organizations need to know? In this blog article, we describe scenarios such as phishing, whaling, fakes and pretexting, tailgating, etc.

Topics: Phishing, Social Engineering, Tips & Tricks, Trends & Technologies

Posted on Tuesday, September 17th, 2019 by
What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a socially engineered scam.

Topics: Artificial Intelligence, Cybersecurity Posture, Penetration Testing, Phishing, Security Practices

Posted on Tuesday, August 20th, 2019 by
All too soon, the summer holidays will come to an end. For some of us, this means getting back to work, starting a new job, or sending our children off to school or university. We don’t think twice about teaching our children about road safety, but now we have to add cybersecurity to the things we teach our children about. In this blog article, we've gathered some cybersecurity tips to help keep parents and their children cybersecure and in today's increasingly digital world.

Topics: Phishing, Security Practices, Tips & Tricks

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now