What is Phishing Email and How Can I Recognise it’s Phishing Email?

What is Phishing Email?

Phishing refers to fake email messages that appear to come from a legitimate company. The messages are designed to trick the recipient into giving personal information to fraudsters. Some phishing messages including malware attachments.

Phishing Email

How Can I Tell it’s Phishing Email?
Continue reading “What is Phishing Email and How Can I Recognise it’s Phishing Email?”

Types and Impact of Social Engineering Attacks

Social Engineering refer to the art of manipulating people into performing actions or divulging confidential information. Cybercriminal uses different platforms like Facebook, LinkedIn or Email to spread malicious link. Social engineering attacks has proven to be very successful way for criminal to “get inside” your organization.
Continue reading “Types and Impact of Social Engineering Attacks”

How to Block Access HTTP and HTTPS Facebook with pfSense Firewall Rules

Problem: How to create alias and block Facebook traffic (IP Addresses and HTTP/HTTPS URL of Facebook) using pfSense firewall rules. Following steps are useful with sites such as Facebook that consume large amounts of IP range but are constrained within a few net blocks.
Continue reading “How to Block Access HTTP and HTTPS Facebook with pfSense Firewall Rules”

Initial Network Security Checklist for IS Security Reference

Network Security Checklist below was created with input from not less than a dozen technology consultants and security experts from Experts Exchange. This Network Security Checklist is not intended to validate a network as secure but as an INITIAL checklist to start from, covers many areas / items that consultants and admins often forget to check and set including business, user accounts, service accounts, file security, passwords, users, administrators, network, computers, firewall / router, email security, remote access, monitoring, devices and backups. The questions / items below may not be appropriate or applicable to all organizations for a variety of reasons due to the risk profile for every organization is different.
Continue reading “Initial Network Security Checklist for IS Security Reference”