Call us on 03450 21 21 51

SRM Solutions
Phishing attacks and the perks of purple teaming
The SRM Blog

Social Engineering

Filter by category
Phishing attacks and the perks of purple teaming

Phishing attacks and the perks of purple teaming

Cyber criminals are like magicians; they rely of sleight of hand. Like theatrical entertainers, they misdirect so that the trick occurs when the audience least expects it. So while..

The evolution of cyber crime

The evolution of cyber crime

Ever since Charles Darwin introduced the theory of evolution in 1859 we have been aware of the continual process of change in the natural world. Things are no different..

How phishing scams are getting schools into deep water

How phishing scams are getting schools into deep water

While many schools are concerned about the advent of the General Data Protection Regulation (GDPR) and what it means for the collection and holding of data, permissions and consent,..

How poor data-stripping can expose organisations to Spear Phishing attacks

How poor data-stripping can expose organisations to Spear Phishing attacks

A survey for the BBC has discovered that poor data-stripping on websites leaves information in place which provides valuable intelligence for Spear Phishing attackers. By not removing key metadata,..

Phishing and GDPR compliance

Phishing and GDPR compliance

By Paul Brennecker, Principal Consultant, CISM | PCI QSA | PCI PFI | PCIP There is a saying that a chain is only as strong as its weakest link. This,..

Promoting and Protecting your Identity on social media

Promoting and Protecting your Identity on social media

How much control is too much when it comes to social media? Organisations spend millions on their marketing campaigns in the hope and expectation of raising brand awareness and..

The Emerging Market of Cyber-crime as a Service

The Emerging Market of Cyber-crime as a Service

One of the greatest misconceptions about cyber-crime is that you need to be a computer geek to be a cyber-criminal. The truth is the cyber-crime industry is starting to..

The real risk of ransomware

The real risk of ransomware

“We do not negotiate with terrorists” is a patriotic statement used by many countries. Does this notion still hold when you risk losing your data? The short answer is..

Ransomware

Ransomware

As with any black hat related activity, innovations are always emerging to circumvent security and exploit vulnerabilities. Older forms of ransomware was mostly kept by specific groups of hackers that..

LinkedIn phishing scams

LinkedIn phishing scams

By Chris Ince, Information Security Consultant, Security Risk Management Ltd LinkedIn recruiting scams are not a new threat to most. Many users of the professional network face this ever..