
Guidance on Defending Against Video Teleconferencing (VTC) Hijacking and Zoom-bombing
The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).
Read More
Smartphone or Tablet Hacked
If you use public Wi-Fi or USB power charging stations at airports, hotels, and
other
locations, make sure to use a VPN when using public Wi-Fi, and always make sure
to use a
USB data blocker...

Website Defacement
CWebsite defacement is an attack on a website that changes the visual appearance of the site or webpage. It is similar to drawing graffiti on a wall, only it happens virtually as a kind of electronic graffiti and is a form of vandalism.
Read More
Advisory On RDP Brute Force Attacks
A way for employees to access corporate devices is by using Remote Desktop Protocol (RDP). Remote Desktop is a remote management tool which allows you to connect to any computer and take over the desktop.
Read More
Alert Regarding Vulnerability (CVE-2019-19781) in Citrix Products
CERT-GH confirmed that information including Proof-of-Concept code about a
vulnerability
(CVE-2019-19781) in Citrix Application Delivery Controller and Citrix Gateway
has been
made public. A remote attacker leveraging this vulnerability may execute
arbitrary code.

Avoid Phishing Scams
Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers.
Read More
ZOOM PHISING ATTACKS
Individuals and businesses have become increasingly reliant on video conferencing to stay connected during the Covid-19 outbreak, hence working from home. Organizations have adapted having online meetings and webinars with the use of platforms such as Cisco WebEx, Microsoft Teams, Slack and Zoom.
Read More
Risk of SharePoint vulnerability
The National Cyber Security Centre (NCSC) is raising awareness of a new remote code execution vulnerability (CVE-2020-16952) affecting Microsoft SharePoint. Successful exploitation of this vulnerability would allow an attacker to run arbitrary code and carry out security actions in the context of the local.
Read More
The Use of Supplement Passwords
Passwords are a good first layer of protection, but attackers can guess or intercept passwords. Additional security measures can protect you even if an attacker does obtain your password. You can strengthen that first layer of protection by avoiding passwords based on personal information; using the longest password or passphrase possible (8–64 characters); and not sharing your passwords with anyone else
Read More
Social Engineering and Phishing Attacks
Attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials.
Read More
SHADOW IT
Shadow IT is the use of information technology systems, devices, software, applications, and services by a department or individual without explicit IT department approval or knowledge within an organization.
Read More
SAFETY OF MOBILE DEVICES
Mobile devices have become a significant part of our life and their widespread use, has led to rapid growth in the development of businesses. Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment
Read More
Reducing Spam
Spam is a common, and often frustrating, side effect to having an email account. Although you will probably not be able to eliminate it, there are ways to reduce it Spam is the electronic version of “junk mail.”Spam does not necessarily contain viruses—valid messages.
Read More
IMPERSONATION OF GOVERNMENT OFFICIALS
National Cyber Security Centre (NCSC) warns of online scams promoting fake job recruitment. Impersonation of government officials is a striking.
Read More
END-OF-SUPPORT SOFTWARE
On July 13, 2015, Microsoft officially shut off extended support for the wildly popular Windows 2003 Server operating system. On that day, it was estimated that as many as 9 million servers were about to lose .
Read More
BACKGROUND