How do you manage something which is etched into human personality and behaviour; the act of wanting to comply with authority and reacting to urgent matters with the utmost interest? Essentially you don’t, you engineer the environment, situations and working processes to complement these weaknesses and thus strengthen them.
Join Celerity & IBM for our LinkedIn Livestream Virtual Event Wednesday 24th June @ 10am.
Tags: Celerity News
Ransomware Attacks In 2020
The debate of whether or not organisations should pay ransoms to cybercriminals in return for their unencrypted data has been going on for years. On one hand, as data is now the lifeblood of almost all organisations a successful ransomware attack can mean business closure. However, succumbing to the ransom is only fuelling the cybercrime economy which is now estimated to be the 3rd largest in the world. But a recent report into ransomware attacks may add weight to the notion of never paying the ransom.
In this week's episode of Secure with Celerity we were joined by Celerity Lead Cyber Security Analyst, Josh Read and Celerity Business Development, Chris McCartney.
Understanding the threat of phishing e-mails and how to spot them is one of the key ways that you can protect your organisation and its employees. The number of phishing attacks being carried out is higher than ever and the form these phishing e-mails take is always evolving.