IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
Click on the slide!

Securing Hadoop and the IoT

Live Webcast!             Join this live event to put your questions to our experts.

Click on the slide!

Combating Targeted Attacks

On-Demand               Play this educational discussion now.

Click on the slide!

PCI DSS: Blue Skies Ahead!

On-Demand               Play this educational discussion now.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
Everyone's Blog Posts - GlobalRisk community


  • Wendy’s Data Breach: What Does it Mean for You?

    The words “data breach” are often met by a clamor whenever they make headlines. Home Depot, Target, Ashley Madison, Heartland, Citibank, the list goes on and on. These breaches spent time in the limelight because of their magnitude; they affected hundreds of thousands – in some cases millions – of cardholders.

    But the reality is data breaches are far more…



  • Phishing attacks Two-Factor Authentication

    Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.

    How a hacker circumvents two-factor authentication:

    • First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
    • Or sends a preliminary phishing e-mail tricking the recipient into revealing login…


  • Don’t just be a colour-ineror

    When I was a wee kid working on a group project, we would always ask “Who is going to be the colour-ineror?  Well just last week a friend of mine reminded me of the term when I was listing support functions that sometimes struggle to make a difference to the business. 

    I was listing finance, HR, IT, risk, compliance, audit and then said, “Even people in sexier functions like in marketing.” …  BANG, she pounced.  “You mean the colouring-in department!”  In her experience working on…



  • Social Engineering: How to steal Brand New iPhones from Apple

    Looks like there’s some worms in Apple.

    Not too long ago, dozens and dozens of iPhones were stolen from two Apple stores. How could this happen, what with Apple’s security? Simple: The thieves wore clothes similar to Apple store employees and obviously knew the innards of the stores.

    They sauntered over to the drawers that held the new phones, acting nonchalant to avoid attracting attention. In…



  • Your Ransomware Response: Prepare for the Worst

    A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to receive a cyber key to unlock your files, you must pay a ransom. Typically, cybercriminals request you pay them in bitcoins.

    The attack begins when you’re lured, by a cybercriminal, into clicking a malicious link that downloads malware, such as CDT-Locker. Hackers are skilled at getting potential victims…



  • 32 Million Twitter Pass for sale Add two-factor NOW

    The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users.

    Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources. Or, they could have used malware to steal passwords off of devices.

    Nevertheless, the end result meant that for many Twitter…