6 social engineering tactics in action in 2021 and what to do about them

6 social engineering tactics in action in 2021 and what to do about them

It’s long been acknowledged that human beings are the weakest link in any organisation’s cybersecurity. Education and training campaigns by employers, government agencies, and other professionals have raised awareness of social engineering tactics, and regularly remind users to be alert, but as with any form of cyber attack, the methods used by cyber criminals to lure…

Read more
Welcome to our new Board Member - Naor Penso

Welcome to our board team – Naor Penso

Cynance is delighted to welcome our new advisory board member Naor Penso. Naor is an exceptional cybersecurity executive leader who brings a wealth of knowledge, vision, and most importantly passion to help guide Cynance through the next stage of our growth and development. A cybersecurity veteran with over 20 years of experience, Naor is an…

Read more
Protect Your Customers With Crypto Wallets Security Testing

Protect Your Customers With Crypto Wallets Security Testing

Crypto wallets with their valuable contents are an attractive target for cyber criminals. Cyber attackers look for any opportunity to breach both hot and cold crypto wallets, and wallet users rely on their wallet providers to keep their crypto currency safe. As a result, crypto wallets implement information security controls to keep them safe, from…

Read more
Can Bug Bounty Programmes Replace Pen Testing?

Can Bug Bounty Programmes Replace Pen Testing?

Security vulnerabilities are a real problem for software developers everywhere, and the organisations that employ them. Many issues are annoying but harmless, but the worst vulnerabilities in a piece of software could compromise security, and cause it to be vulnerable to a breach, which if realised, could cause untold damage to the organisation. The traditional…

Read more
A Cyber Attack Isn’t Over Until the Post Event Analysis Says So

A Cyber Attack Isn’t Over Until the Post Event Analysis Says So

To borrow a phrase from Oscar Wilde, to fall victim to a ransomware attack once may be regarded as a misfortune. To fall victim to a ransomware attack twice looks like carelessness. And yet, that is exactly what happened to an organisation just this month. They paid the ransom, received the decryption key, restored systems,…

Read more
Smishing Text Messages Bring Cyber Attacks to Phones

The New Frontier: Smishing Text Messages Bring Cyber Attacks to Phones

You know all about phishing scams via email, and you are careful to never click on a link you don’t recognise. But how careful are you when it comes to messages on your phone? Are you confident that the SMS from the bank, or the link sent to you via WhatsApp from your friend is…

Read more
Cyber Security Trends 2021 After The Perfect Storm Of 2020

Cyber Security Trends 2021 After The Perfect Storm Of 2020

2020 has been described by some as the ‘Cybercrime Peak’. While it is undeniable that cyber crime increased dramatically in 2020, based on current form, the cyber security trends for 2021 look to be heading the same way. 2020 saw some old cyber security trends increase in popularity (did anyone say ransomware?), and some new…

Read more
Up Your Email Security Game With DMARC Email Authentication

Up Your Email Security Game With DMARC Email Authentication

The battle against phishing, spam, and malicious emails is never ending. 3.1 billion domain spoofing emails are sent every single day, forcing email provider filters to work extra hard to filter out malicious emails and prevent them from reaching inboxes. In this ongoing, multifaceted battle, DMARC email authentication is one way that every organisation can…

Read more
You’re going for ISO 27001 certification. Now what?

You’re going for ISO 27001 certification. Now what?

Information security is important to everyone. Many of your current and future clients may add ISO 27001 certification as a condition of doing business with you, putting you in a position where you need to start assessing your policies, processes, and procedures. While ISO 27001 alone won’t guarantee you have effective information security practices in…

Read more
Emotet Malware is a Gift That Keeps on Giving

Emotet Malware is a Gift That Keeps on Giving

Not all malware are created equally. And of all the malware out there, the Emotet malware is one of the most potent. Throughout its long life, Emotet has been linked to major malware attacks, and has consistently topped the Global Threat Index since September 2020. The only exception was a relatively quiet November, during which…

Read more
New WhatsApp Privacy Policy Announces Facebook Data Sharing

New WhatsApp Privacy Policy Publicly Acknowledges Facebook Data Sharing

The new WhatsApp privacy policy released this week raised several key questions for data protection experts everywhere (and everyone else really). The new privacy policy sets out the information that WhatsApp shares with Facebook, and makes it clear that this policy is non-negotiable – if you don’t like WhatsApp sharing your data with Facebook, your…

Read more