Tag Archives: knowbe4

Cybersecurity is Virtual Combat but very real

Cybersecurity is Virtual Combat but very real

I’ve spent 6 years in the army, and the most important thing any soldier relies on is training. Be drilled to the core of your bones ensures that in highly stressful situations, and you do not get more stressful than in combat, you do not act impulsively or irrationally. As it is instinctively ingrained into your brain, you can very quickly draw on your knowledge to make correct decisions. It also ensures that you can rely on your mates and they can rely on you so that the whole of the organisation runs effectively with the least chance of casualties.

Cyber defence is not much different from an operational perspective. Although we’re not talking of immediate life and death here, the survival of a company could well rely on your responses of a cyberattack. Not being prepared is the most stressing issue for any CISO (Chief Information Security Officer) in any organisation.

Continue reading

Cyber Hacks – Prevention Versus Cure

Getting sick is a really nasty experience. Being forced to stay in bed because you cannot move an arm and a leg, your nose dripping constantly and a headache bouncing in your skull all day is the opposite of a pleasant experience. When you then take into account, you could’ve prevented this by just taking out a flu-shot at the beginning of autumn, you still wonder why you didn’t. No time? Did not want to fork out $30,00 as cost of living is hard enough?
Not being able to work and missing opportunities for your business is far more costly, and regaining customer confidence when it comes to business continuity can be a real challenge.

Extrapolate this to a cyber hack where your customer data is threatened to be exposed to the outside world and criminals are able to reach into the deepest of pockets of your customers by extortion methods, identity theft etc.

Continue reading

Business Email Compromised? Or not?

When it comes to Phishing attempts, email is the number 1 methodology to try and lure unsuspecting victims into traps that could result in various precarious scenarios with, most often, devastating consequences. It is therefore of the utmost importance to identify these attempts and prevent them from even reaching the email inbox of the recipient.

When your company assets are being used as part of a spam/phising attack where victims get emails with letterheads and logo’s of your company, the implications are far-reaching from brand damage via customer impact to financial burdens. So how do you do that?

Continue reading

Latitude Financial Services has been “hacked”

Huh???, why the quotes?

A hack is not really a hack when a spear phising attempt is able to obtain employee credentials, who are then used to basically bypass all security measures that are in place. Is it really a “burglary” when you leave the front-door open, or more an invitation for criminals to go “shopping”?

The Latitude security page shows a somewhat troublesome image that seems to be in line with the policies and procedures that are followed in the company. Too much “easy going” will eventually catch up with you.

Irrespective of terminology, the fallout of the breach is significant, with detailed information of a large customer base being stolen. Latitude Financial Services observed a breach that had all the hallmarks of a relatively simple spearphishing campaign and it most likely took only one employee with enough authorisation in one or more systems, to do this significant damage.

This comes just days after I wrote about the poor state of security in the financial services industry and the lack of preventative measures that should’ve been in place to prevent this from happening. Latitude is not the only one and it is just matter of time that other institutions will see the same fate.

Actions to take now

I know I’m sitting on the side line here making a high level analysis, but when relatively simple things like credential theft through phising happens, you can imagine that awareness training and Verifier Impersonation Resistant MFA technologies have not been used at Latitude.

I’ve said it before, customer and employee phishing awareness as well as full proof MFA solutions will prevent this to the extent that attempts to breach into environments are only possible under physical duress of the owner of the token.

As an authorised partner of KnowBe4 and Yubico, we can help in bringing you solutions that tackle both the main two problems that have a root cause of the breach at Latitude. Ask us for a demo of KnowBe4 and how this can help your organisation in elevating awareness of the various phishing methodologies and how to thwart them, or click here to register directly.

Contact us for Yubico solutions to help you and your customers to obtain maximum, phising resistant, MFA protection.

Kind regards,


Let’s go Phishing.



  1. The act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account. The email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords; these details are then used by the owners of the website to conduct fraud.
  2. The act of circumventing security with an alias.

If you read my previous post (Cybersecurity prevention is like Whack-a-mole) you would have seen that a large part of defending your organisation against malicious people and organisations comes down to people and having the knowledge and awareness to be able to assess suspicious activities.

Continue reading