top of page

How your staff could be the key to keeping your data secure


Your staff could be the key to keeping your data secure These days IT security has become very advanced and effective. So much so that hackers have now turned to targeting employees to try and obtain access to data through what is known as Social Engineering.


What is Social Engineering? Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. This can be in the form of phone calls, emails, website downloads and more. What is Phishing? Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim (via email, text or phone) into providing secure information including passwords. How can you protect your company from this type of cyber attack? Habitat3 has had good experiences with Sydney based security awareness training organisation - Phriendly Phishing. The training is delivered online and focuses on increasing awareness and reducing the potential for hackers to convince your staff (via phone or email) to provide them with data or passwords. Their course takes about 30-45 minutes to complete (approx $100 per staff member) and we believe will help your staff better recognise attempts to gain security related information. More information about security awareness training Company name: Phriendly Phishing Phone: 1300 407 682 Email: info@phriendlyphishing.com Overview of their service: https://www.phriendlyphishing.com/about-us/ Phishing Awareness Training information: https://www.phriendlyphishing.com/phishing-awareness-and-simulation-training/ Direct link to request a Demo: https://www.phriendlyphishing.com/request-a-personalised-demo/ Cyber Security Review

If you have any concerns about your current cyber security protections please let us now and we can take you through a quick review to ensure you have the key elements in place. More information at: https://www.i360cloud.net.au/cybersecurity

0 comments

Comments


bottom of page