Table Of Contents:
Meet ISMS.online’s Monsters of Infosec
Halloween’s coming, the spookiest time of year. That set us thinking about our favourite monsters. They have a lot in common with the infosec challenges we help our clients face and defeat.
This week we’ll introduce our top five monsters from our Monsters of Infosec deck of cards. They’re just a few of the infosec monsters that are out there. Which other ones do you think our pack of cards should include?
Oh, and we’ve dropped in our favourite movie versions of each of them to give you some Halloween viewing ideas.
#21 Vampire
Vampires are terrifying. But they’re also charming. That’s because most of them can only enter your house if you invite them in. They’re like phishing or trojan attacks. You’ve got to say yes to them before they can start sucking your blood.
Our favourite vampire movies: Horror of Dracula, because Christopher Lee. Or What We Do In The Shadows, because New Zealand vampires rule.
See how to stay safe from infosec monsters
Related Posts
Information security priority for 2017
2016 will be remembered by many for some of the alarming cyber events that took place.There were the allegations that the Russians may have influenced… Keep reading >Join ISMS.online and Advice Cloud in a live webinar discussing G-Cloud 10
With the long-awaited G-Cloud 10 opening up applications on Wednesday 17th April, we have joined up with partner Advice Cloud to deliver a live ‘what… Keep reading >International Women’s Day 2018: The women working in cyber, infosec, data protection & tech
Table Of Contents:1 - Becky Pinkard2 - Sally Eaves3 - Rosie Anderson4 - Katie Sanderson5 - Tara Taubman-Bassirian6 - Kunjal Tanna6.0.1 - And finally…7 - … Keep reading >An introduction to 2 Factor Authentication
Table Of Contents:0.0.1 - Ensuring that passwords are strong and secure has always been a hot topic in the world of information security. All Alliantist… Keep reading >Top 5 Information Security Podcasts to Follow
Information security is a busy calling. Keeping up with security news whilst staying abreast of recent incidents and threats can be a time consuming business.… Keep reading >Monsters of Infosec: Werewolf
#18 Werewolf: The thing about werewolves is that you always know when they’re going to pop up. Every full moon, regular as clockwork, there’s some… Keep reading >“What’s your password please caller?”
You are only as secure as your weakest linkKeeping information secure within your organisation rests on the actions of your staff. You can develop strong… Keep reading >G-Cloud 9 respondents shape-up to meet information security requirements
There is just one week to go before G-Cloud 9 applications need to be submitted and we thought we’d investigate how respondents feel about the… Keep reading >Why “A Christmas Carol” is really a catalogue of infosec disasters
Christmas is on its way! We’re looking forward to a bit of tinselly cheer after the endless challenges of 2020. And that’s turned our thoughts… Keep reading >Make your next move your best move
If you’re looking for your next move and fancy working for one of the UK’s top 20 cyber scale-ups as awarded by Tech Nation, then… Keep reading >Stay Informed
Join our club of infosec fans for a monthly fix of news and content.
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- December 2019
- November 2019
- October 2019
- June 2019
- May 2019
- April 2019
- August 2018
- July 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- October 2017
- September 2017
- August 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015