Skip to content
Open Source Intelligence – OSINT  Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

Latest

OSINT collects information from anywhere and everywhere

Open Source Intelligence – OSINT 

Last week I was looking at social media and privacy and I discussed some of the things I do and … Read more

Categories Latest Tags cyber security, open source intelligence, OSINT, policies and procedures, Privacy, Smart Thinking Solutions, web browsers
social engineering is greatly helped by the information gathered by OSINT

Phishing Primer – Social Engineering (pt. 2)

I promise you this is a primer on Phishing but I still have some things to add about social engineering … Read more

Categories Latest
encryption

Keep It Simple… Encryption (pt. 2)

This is the second part of my short series looking at the benefits of encryption when included in a cyber … Read more

Categories Latest Tags BitLocker, cyber security, CyberAwake, encryption, governance, Microsoft 365, Microsoft OneNote, Octagon Technology, OneNOte, passwords, policies and procedures, Privacy, Secrecy, Windows
Pull the Plug: But I haven’t got a plug! Cyber Awake

Pull the Plug: But I haven’t got a plug!

This article is a response to a question I got about this article “Minimise the Damage – Planning and Preparation”. … Read more

Categories Latest Tags business continuity, cyber security, governance, incident response, malware, planning and preparation, policies and procedures, ransomware
encryption

From Encryption Ransomware to Extortion Ransomware Part II

This is part two of my piece on extortion ransomware. The first part is here – you should read it … Read more

Categories Latest Tags academic paper, cyber security, encryption, encryption ransomware, extortion ransomware, policies and procedures, ransomware, Smart Thinking Solutions
email attack

The Out-Of-Office Email and How It Compromises Your Organisation’s Cyber Security

Before heading out on our leave, we all use that handy feature in our email – the Out-of-Office (OOO) auto-reply … Read more

Categories Latest Tags academic paper, cyber security, cybersecurity, Microsoft, Microsoft 365, Microsoft Exchange, Microsoft Office, Out of Office notification, phishing, social engineering
The Out-Of-Office Email and How It Compromises Your Organisation’s Cyber Security Cyber Awake

Contact us for consultation

Wake up to cyber threats..

The Out-Of-Office Email and How It Compromises Your Organisation’s Cyber Security Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close