How To’s: Your go-to when in doubt

No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.

Learn how to quickly get the hang of ATTACK Simulator

You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:

 

  • How to get started
  • How to create your first simulation
  • How to whitelist
  • How to understand reports
Quick guide to 6 common types of phishing

Quick guide to 6 common types of phishing

Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud.   From phreaking to phishing The term...

Top 3 ataques de phishing del año 2020

Top 3 ataques de phishing del año 2020

Aunque parezca increíble, seguimos cayendo en la trampa de los engaños que emplean suplantación de identidad para robar información, dinero o tomar el control de los sistemas atacados. Los ataques de phishing pueden usar una amplia variedad de aplicaciones móviles,...

Massive LinkedIn breach: 700M users’ data exposed

Massive LinkedIn breach: 700M users’ data exposed

After a similar incident in April, in which a jaw-dropping 500 million profiles were put up for sale online, LinkedIn suffers a second massive data breach. Reportedly, the latest incident has exposed the sensitive data of 700 million (92%) of its users. The leaked...

Ransomware victim? Here are 8 things to do after the attack

Ransomware victim? Here are 8 things to do after the attack

Ransomware attacks have increased recently! "Why can’t I open that document? My computer is just getting slower and slower; I need help!" It all starts with this, and then you get a call from your IT team telling you the words you were hoping not to hear: "We’ve been...

No more “Son, how do I…?” Find your answers here

Computer security can be an intimidating subject. We prepared a few guides to get you started.

  • Introduction to Antivirus Solutions
  • Introduction to VPNs
  • Security when working from home
Quick guide to 6 common types of phishing

Quick guide to 6 common types of phishing

Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud.   From phreaking to phishing The term...

Top 3 ataques de phishing del año 2020

Top 3 ataques de phishing del año 2020

Aunque parezca increíble, seguimos cayendo en la trampa de los engaños que emplean suplantación de identidad para robar información, dinero o tomar el control de los sistemas atacados. Los ataques de phishing pueden usar una amplia variedad de aplicaciones móviles,...

Massive LinkedIn breach: 700M users’ data exposed

Massive LinkedIn breach: 700M users’ data exposed

After a similar incident in April, in which a jaw-dropping 500 million profiles were put up for sale online, LinkedIn suffers a second massive data breach. Reportedly, the latest incident has exposed the sensitive data of 700 million (92%) of its users. The leaked...

Ransomware victim? Here are 8 things to do after the attack

Ransomware victim? Here are 8 things to do after the attack

Ransomware attacks have increased recently! "Why can’t I open that document? My computer is just getting slower and slower; I need help!" It all starts with this, and then you get a call from your IT team telling you the words you were hoping not to hear: "We’ve been...