Detecting a Phishing 10Things to Watch

With the uptick in ransomware infections that are often instigated through phishing emails, it’s crucial to take proactive measures to help protect yourself and your organization’s security. Having a computer that is up to date and patched makes a big difference in reducing an organization’s overall risk of infection. But being vigilant in detecting phishing emails and educating employees in your organization to also be proactive is a critical step in protection. Here is a quick top ten list for how to spot and handle a phishing email.

Spotlight

Satelles

Satelles provides unique timing and location solutions delivered over the Iridium® constellation of 66 low-earth-orbiting satellites. These timing and location signals are available anywhere on Earth, without the need for local infrastructure, making the system perfect for augmenting GPS and other location-based technologies. Unlike standard GPS, these high-power signals can reach into many building structures. Most importantly, Satelles has customized the Iridium signal-in-space to provide a location-specific signature that can reliably prove (or authenticate) the location of a mobile device or other equipment, while being virtually impervious to spoofing and other attacks.

Other Infographics
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Active directory IT security infographic

Infographic | January 24, 2020

Active Directory is a great technology. In fact I can’t image life without it. It’s pretty easy to set up, with every Microsoft Server release it gains additional options that make life for IT easier. Did you know that only 5% of 1000 fortune companies don’t use AD to organize their environment?

Read More

Spotlight

Satelles

Satelles provides unique timing and location solutions delivered over the Iridium® constellation of 66 low-earth-orbiting satellites. These timing and location signals are available anywhere on Earth, without the need for local infrastructure, making the system perfect for augmenting GPS and other location-based technologies. Unlike standard GPS, these high-power signals can reach into many building structures. Most importantly, Satelles has customized the Iridium signal-in-space to provide a location-specific signature that can reliably prove (or authenticate) the location of a mobile device or other equipment, while being virtually impervious to spoofing and other attacks.

Events