EH Academy Blog

Inside Out of the Academy

4 Best Security Practices to Prevent Malware Distribution via Email

Email is the most common and strongest method of communication on the Internet, maybe even on the planet. It’s built into almost everything, from phones and tablets to traditional computers to gaming devices, even connected home appliances and cars can do email. Emails in an organization serves...

READ MORE

Lockout Hackers from Mobile Devices in 6 Simple Ways

Mobile technology has come a long way in a relatively short space of time. In less than 30 years we’ve moved away from big, brick-like cellular phones and a nascent internet to a world of super-slim and powerful smartphones, tablets and convertible laptops that are able to transmit and store...

READ MORE

5 People Who Poses Greatest Inside Security Risks

Each year, many information security incidents occur, and the majority of those were due to inside sources. The Prime suspects are employees and contractors with the privileged user access, says Sam Elliott, director of security product management at Bomgar. However, researchers also state that...

READ MORE

Certification Path to become Information Security Architect

A Security Architect is the most essential and a senior level position in an organization who designs, builds and oversees the implementation of network and computer security in an organization. As a top level employee, security architect is responsible for creating complex security structures...

READ MORE

Your Identity has been Stolen: The Real Threat

Identity theft is a crime in which an attacker obtains potential pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to attain credit, merchandise, and services in the name of the victim, or to...

READ MORE

Ransomware upset the Infosec Community in February 2017 – How?

According to research from computer security firm Malwarebytes, Ransomware is fast becoming a ubiquitous security threat, with nearly 40% of all businesses experiencing an attack in the past year. Cybercriminals are looking for easier ways to earn higher profits from more lucrative targets, which...

READ MORE

You know Cybersecurity, You should Rethink Security

As cyber crime is rapidly rising, one thing is clear that cyber security isn’t just an issue for the technology industry, but also affecting many other industries like hospitals, insurance, education and other. Cyber crime is costing big brands like Samsung, JP Morgan and Vodafone millions of...

READ MORE

The 5 Steps to Identify Phishing Emails

As cybercriminals are getting smarter and their phishing skills are getting better, assuming yourself clever enough to recognize phishing scams would be your worst mistake. According to Verizon’s data breach investigation report 2016 , around 305 of phishing emails get opened that makes it...

READ MORE

Cyber Security Expert Advice from RSA 2017

RSA Conference is a cryptography and information security-related conference. It conducts information security events around the globe that connect you to industry leaders and highly relevant information. The conference is dedicated to deliver, on a regular basis, insights via blogs, webcasts,...

READ MORE

Self-Made Wi-Fi Security Threats

As the internet evolves and computer networks become bigger and bigger, network security has become one of the most important factors for companies to consider. By increasing network security, we can decrease the chance of privacy spoofing, identity or information theft and so on. Network...

READ MORE