Phishing security awareness posters

July 18, 2019

DON’T TRUST THE DISPLAY NAME. Just because it says it’s from a known entity doesn’t mean it is. Check the email address to confirm. LOOK BUT DON’T CLICK. Hover over images and links—if the alt text that appears doesn’t match, it’s probably phishing.

Spotlight

Hurricane Labs

As your Managed Security Services Provider, our customized solutions support your enterprise in the areas of SIEM management, threat detection, and vulnerability management. Our Splunk-dedicated experience empowers us to help build, maintain and grow your Splunk instances, along with our 24x7 Security Operations Center that makes your alerts useful to your environment.

Other Infographics
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More
news image

Impact of Social Engineering Attacks

Infographic | April 4, 2022

A social engineering attack exploits human error to gain access to private and sensitive information.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More
news image

Necessity of Cloud Database Security Best Practices

Infographic | February 15, 2022

Cloud Database Security is essential as it is subject to numerous cybersecurity threats. A well-designed cloud database security best practice can effectively reduce the risk of cloud database breaches.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Spotlight

Hurricane Labs

As your Managed Security Services Provider, our customized solutions support your enterprise in the areas of SIEM management, threat detection, and vulnerability management. Our Splunk-dedicated experience empowers us to help build, maintain and grow your Splunk instances, along with our 24x7 Security Operations Center that makes your alerts useful to your environment.

Events