Differentiating the terms risk, vulnerability, and threat is quite difficult in a cyber security setting. This post intends to give a clear outline.
Tag: vulnerability
How do you handle antivirus alerts
Antivirus incidents are quite common. But there are special, and effective ways to handle them.
The most complex case of CEO Fraud… yet; and how to mitigate it.
CEO fraud is one of the most devious forms of cybercrime, and social engineering. The most complex form was experienced, and the risk for future attacks was mitigated.
Why it’s a good idea to isolate EOL applications/software with insufficient patches, and how to do it
Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.