EH Academy Blog

Inside Out of the Academy

5 People Who Poses Greatest Inside Security Risks

Each year, many information security incidents occur, and the majority of those were due to inside sources. The Prime suspects are employees and contractors with the privileged user access, says Sam Elliott, director of security product management at Bomgar. However, researchers also state that...

READ MORE

Certification Path to become Information Security Architect

A Security Architect is the most essential and a senior level position in an organization who designs, builds and oversees the implementation of network and computer security in an organization. As a top level employee, security architect is responsible for creating complex security structures...

READ MORE

Your Identity has been Stolen: The Real Threat

Identity theft is a crime in which an attacker obtains potential pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to attain credit, merchandise, and services in the name of the victim, or to...

READ MORE

Ransomware upset the Infosec Community in February 2017 – How?

According to research from computer security firm Malwarebytes, Ransomware is fast becoming a ubiquitous security threat, with nearly 40% of all businesses experiencing an attack in the past year. Cybercriminals are looking for easier ways to earn higher profits from more lucrative targets, which...

READ MORE

You know Cybersecurity, You should Rethink Security

As cyber crime is rapidly rising, one thing is clear that cyber security isn’t just an issue for the technology industry, but also affecting many other industries like hospitals, insurance, education and other. Cyber crime is costing big brands like Samsung, JP Morgan and Vodafone millions of...

READ MORE

The 5 Steps to Identify Phishing Emails

As cybercriminals are getting smarter and their phishing skills are getting better, assuming yourself clever enough to recognize phishing scams would be your worst mistake. According to Verizon’s data breach investigation report 2016 , around 305 of phishing emails get opened that makes it...

READ MORE

Cyber Security Expert Advice from RSA 2017

RSA Conference is a cryptography and information security-related conference. It conducts information security events around the globe that connect you to industry leaders and highly relevant information. The conference is dedicated to deliver, on a regular basis, insights via blogs, webcasts,...

READ MORE

Self-Made Wi-Fi Security Threats

As the internet evolves and computer networks become bigger and bigger, network security has become one of the most important factors for companies to consider. By increasing network security, we can decrease the chance of privacy spoofing, identity or information theft and so on. Network...

READ MORE

5 Security Tips to Protect Startups from Cyber Threats

Startup business essentially requires customer’s data for its development and sustainability, for which IT security should be considered as top most priority. There is no denying to the fact that, investing in a security infrastructure is expensive for startups where investments are not that...

READ MORE

The Top 5 Cybersecurity Conferences you should Attend in 2017

Conferences are important events in almost every industry, giving professionals the opportunity to learn about new developments, get valuable insights from leading experts, and network with other professionals. It has helped many organizations to explore the new talent and skilled professionals...

READ MORE