Community
COMMUNITY RESOURCES

The Human Factor Radar

Free Cyber Security Awareness Training Resources and Alerts for the Community

Security Awareness Advisories

Subscribe

Find an article

Latest

Securing Access Control Devices

Access control devices help us to secure our organisation against cyber as well as physical intrusions. It ensures that our sensitive information is secure from unauthorised access, modification or destruction. Download Infographic Download and [...]

Browser Hijacking

Browser hijacking, or search hijacking, is a type of malware that takes over your web browser’s settings without your permission. This technique has been used by hijackers to compromise your sensitive information or to boost their [...]

Common Cloud Security Threats

More data and applications are moving to the cloud, thus creating unique Cybersecurity challenges. Here are the common cloud security threats organisations face while using cloud services. Download Infographic Download and share the infographic [...]

Don’t let Shadow IT haunt you!

Shadow IT is the use of information technology systems, devices, software and services without prior approval from the IT department. Download Infographic Download and share the infographic for free with employees. Risks [...]

How to stay safe from pass-the-cookie attacks?

The remote working scenario has increased our reliance on cloud and web services. These services often have access to our personal and business-sensitive information. Pass-the-cookie attack is a method used by cybercriminals to gain unauthorized access [...]

How secure are video conferencing tools?

Video conferencing tools make it easier for us to see and stay connected with our colleagues, friends and family. But this ease of communication could also make it easier for cybercriminals to access our information. [...]

Clickjacking Attacks

A Clickjacking, also known as UI redressing attack tricks the user into clicking a webpage element (buttons, hyperlinks, etc.) that is either invisible or disguised as other visual elements. Download Infogrpahic Download and share [...]

Rising threat of fileless attacks

Fileless attacks make use of in-built applications in a system. It allows cybercriminals to inject code into memory level (RAM) making these attacks difficult to detect.  Download Infographic Download and share the infographic [...]

Beware of malicious Azure apps

The remote work scenario has seen more organizations shift to Microsoft 365. Threat actors are using this chance to launch a new phishing campaign spreading malicious Azure apps. Download Infographic Download and share [...]

Cyberattacks on Remote Desktop Protocols

Cyberattacks targeting Remote Desktop Protocols (RDPs) used by employees to access corporate resources remotely is increasing at an alarming pace. Download Infographic Download and share the infographic for free with employees. Cybercriminals [...]