FullColourGoldPhishIconLogo.png

GOLDPHISH

CYBER SECURITY AWARENESS

  • Home

  • Platform

    • Training Platform
    • Training Content
    • Phishing Simulator
  • Partner

    • MSP Partners
    • Insurance Partners
  • Pricing

  • About

    • Meet GoldPhish
    • FAQs
    • In The Press
  • Blog

  • Login

    • GoldPhish Platform
  • More...

    Use tab to navigate through the menu items.
    START FREE TRIAL
    • All Posts
    • Access Control
    • BEC scams
    • Blockchain
    • blackmail
    • Becybaware
    • Cloud Security
    • Blog
    • Cameras and Microphones
    • Cyber Insurance
    • CybACADEMY FREE 100
    • Computer Virus
    • Cyber Safety at Home
    • Cyber Safe
    • Cybersecurity
    • Data Protection
    • Data sharing
    • Fraud
    • Geolocation
    • GDPR
    • Identity Theft
    • Kids & Digital
    • Malicious Software
    • Kids & Tech
    • Malware
    • Online gaming
    • Online dating scams
    • POPI
    • Phishing
    • Sextortion
    • Ransomware
    Search
    Remote Access Fraud
    GoldPhish
    • May 6, 2020
    • 3 min

    Remote Access Fraud

    Imagine falling victim to Remote Access Fraud… You wake up one morning to find you’ve lost some money. Not the loose change your children sometimes “lovingly” borrow out of your wallet from time to time, but the kind that really worries you and shows up on your bank balance as obviously down from when you checked it the night before. Your mind does a quick check… “no it’s not month-end; no it isn’t dreaded debit order time; and no I didn’t purchase anything online recently…mm
    0 views
    COVID-19 outbreak: How to avoid cyber criminals taking advantage
    GoldPhish
    • Apr 5, 2020
    • 4 min

    COVID-19 outbreak: How to avoid cyber criminals taking advantage

    We have been overrun these past few months with everything Coronavirus, COVID-19-related, and with it, a near-constant stream of information and disinformation sent to us/available from/on every platform known and used by man. The world has gone a little crazy. The problem here – besides the fear, panic and already crippling, economic ripple-effects from the virus itself – are the opportunistic cyber criminals who revel in exploiting this fear and chaos in order to steal mone
    0 views
    Cameras and Microphones | Are you being watched?
    GoldPhish
    • Mar 3, 2020
    • 5 min

    Cameras and Microphones | Are you being watched?

    Are we being spied on via our cameras and microphones on our personal devices? Built-in device cameras and microphones are great. They allow us to easily communicate face-to-face with friends and family even if they are on the other side of the globe. They allow journalists to interview people in far flung corners of the world, and they allow entrepreneurs in remote locations to do business with people in big cities across the world. The problem is that these tiny cameras and
    0 views
    Online Gaming and Cyber Crime – are you playing, or being played?
    GoldPhish
    • Feb 11, 2020
    • 3 min

    Online Gaming and Cyber Crime – are you playing, or being played?

    When it comes to games – especially online gaming, it’s one thing to play, but it’s altogether something else to be played! Three interesting facts about the global online gaming industry… The worth of the PC online game market worldwide is expected to reach $45.5 billion by 2021. (Statista, Nov 2019) It is estimated there will be 2.7 billion gamers by 2021. Almost a third of the human race! (Statista, Aug 2019) The number 1 game for awarded prize money in 2018/19 was ‘Dota 2
    0 views
    Get your Free Resources for Cybersecurity Awareness Month
    GoldPhish
    • Sep 17, 2019
    • 2 min

    Get your Free Resources for Cybersecurity Awareness Month

    Are you and your organisation ready for Cybersecurity Awareness Month 2019? This is your opportunity to share key cybersecurity knowledge with your networks and help build a more secure community! What are we doing during Cybersecurity Awareness Month? GoldPhish is proud to provide free CyberMonth2019 educational resources you can distribute through the month of October. The toolkit will help you inform, educate, and empower your networks on simple Cybersecurity controls and
    0 views
    Access Control in the digital world
    GoldPhish
    • Jun 6, 2019
    • 3 min

    Access Control in the digital world

    We all want to feel safe. We all want to feel secure. We all want to know that the things we value are safe and secure. Safety and Security. On December 10th 1948, the General Assembly of the United Nations (UN) adopted and proclaimed the Universal Declaration of Human Rights, stating – “Everyone has the right to life, liberty and security of persons”. We all want to feel safe. We all want to feel secure. We all want to know that the things we value are safe and secure. The f
    0 views
    Facebook and fencing yours in
    GoldPhish
    • Apr 8, 2019
    • 10 min

    Facebook and fencing yours in

    It’s safe to say Facebook isn’t safe. Just last month (Thursday 21 March 2019) Facebook announced yet another data breach – the third in a year (we know of), this time involving up to 600 million passwords stored in plain text and exposed internally to up to 20,000 employees of the social network giant. The news caps a long period of trouble for Facebook over the way it handles and protects user data. In September last year, it said information on 50 million users had been ex
    0 views
    Cryptojacking – the rising crime of mining digital currency
    GoldPhish
    • Mar 21, 2019
    • 5 min

    Cryptojacking – the rising crime of mining digital currency

    To jack somebody (for something) is to steal something from somebody, especially something small or of low value. Being jacked isn’t going to ruin your life necessarily – it’s not like having your bank account details stolen or having your private credentials hacked, but it certainly is a nuisance, and if it happens every day it could definitely have a negative affect on your life. In our blog (Security Benefits of Blockchain) we looked at how blockchain works and what securi
    0 views
    Blockchain Security Benefits
    GoldPhish
    • Feb 13, 2019
    • 5 min

    Blockchain Security Benefits

    In building, a wall made of 500 connected, overlapping small concrete blocks with steel is stronger than a wall made of one, large concrete “block” without steel. If you wanted to keep a single letter, one “block” of information or an individual document of private data safe and secure ten or 2000 years ago chances are you would have kept it under lock and key in one “secret” place, and/or possibly encrypted it with a cypher – like the famous Roman General Julius Caesar did w
    0 views
    Watering hole attacks – what are they and how to prevent them?
    GoldPhish
    • Jan 25, 2019
    • 4 min

    Watering hole attacks – what are they and how to prevent them?

    A watering hole is a waterhole from which animals regularly drink, right? True. Or a pub, bar or restaurant – any place where people gather socially, right? Also true. Well in the world of cyber security there is a third, which derives its name from the first two – a ‘Watering hole attack.’ The concept behind the watering hole attack is that in order to insert malware (malicious software) into a company, you must stalk an individual or group and place malware on a site that t
    0 views
    A brief history of computer viruses
    GoldPhish
    • Dec 4, 2018
    • 7 min

    A brief history of computer viruses

    We all know the feeling; a sore throat, sneezing, congestion, a cough, a runny nose…oh no, the dreaded cold virus! No human is immune. Likewise, no computer is immune. How it happens, how it works and how we treat it remain mostly the same for human and computer. Computer viruses, much like the flu virus, are designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viru
    0 views
    What is a SIM Swap Scam?
    GoldPhish
    • Oct 23, 2018
    • 3 min

    What is a SIM Swap Scam?

    In June of this year (2018) an 85-year-old South African pensioner had R300 000 – roughly USD $20 000, stolen from his bank account in a SIM swap scam. A SIM swap scam? SIM Swap fraud (also known as SIM splitting) is a type of account takeover fraud that generally targets a weakness in two-factor authentication or two-step verification, where the second factor or step is an SMS or a call placed to a mobile telephone. How it works… The fraud centres around exploiting a mobile
    0 views
    Destruction and disposal of sensitive data
    GoldPhish
    • Sep 12, 2018
    • 4 min

    Destruction and disposal of sensitive data

    Nothing short of grinding your physically-stored data into granola dust for scrap-yard-hungry robots will do. Only physical drive destruction will offer definitive disposal of sensitive data for those unwanted, damaged or dated devices. Data destruction is the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorised purposes. Everything from USB flash drives,
    0 views
    Data Protection Regulations – Understanding GDPR & POPI
    GoldPhish
    • Aug 29, 2018
    • 5 min

    Data Protection Regulations – Understanding GDPR & POPI

    We all know the intrusive feeling of those irritating and unwanted emails, texts and phone calls that plague us – seemingly daily, from companies that have somehow acquired our personal and private information. Here’s what you need to know about Data Protection and the new regulations that have come into play… As consumers, we don’t realise how much information is revealed about us while using the Internet, or fully appreciate how in previous years data and information about
    0 views
    Geolocation | Yes, your devices tell us exactly where in the world you are
    GoldPhish
    • Jul 24, 2018
    • 4 min

    Geolocation | Yes, your devices tell us exactly where in the world you are

    Have you ever wondered how the colossal entity that is the Internet – including apps, websites, companies and even private individuals – almost always knows where you are in the world or what you’re up to? Constantly suggesting things of interest in relation to or with your location, advertising banners for things and places relevant to where you are and what you’re doing? Well, THAT’S Geolocation. Geolocation is a technology that uses data acquired from your computer or mobi
    0 views
    Saying too much on your Social Sites?   Social Media Privacy and Security
    GoldPhish
    • Jul 11, 2018
    • 4 min

    Saying too much on your Social Sites? Social Media Privacy and Security

    Can you imagine a world without social media? No Snapchat, no Instagram, no Twitter, no Facebook! A world where children and adults woke up in the morning and got excited about playing outdoors and seeing each other in the flesh, rather than being sucked into their phones; checking their feeds, likes and comments – zombies to the real world around them. A world where security and privacy were tangible, physical problems we could easily identify and protect ourselves against.
    0 views
    Cyberbullying: know the signs, manage the risk – for children, teens and adolescents
    GoldPhish
    • Jul 5, 2018
    • 4 min

    Cyberbullying: know the signs, manage the risk – for children, teens and adolescents

    We all know of or remember a bully; especially from our childhood. That person, who by force, threat, or coercion abused, intimidated or aggressively dominated us or others we knew. We would, and often could avoid these “physical” in-person attacks. Unfortunately, while better connecting the world and democratising information, the Internet also now allows bullies to hide behind masks of anonymity. The darker side, the “faceless evil” of the Internet is a growing threat to te
    0 views
    The Internet of Things | Allowing more ‘things’ to think and act for us!
    GoldPhish
    • Jun 26, 2018
    • 4 min

    The Internet of Things | Allowing more ‘things’ to think and act for us!

    Have you ever wondered about all this talk of “things” being “smart”? “Smart” phones and “smart” cars, “smart” homes and “smart” bars… with all this talk about things getting “smarter”, one has to wonder, are we as humans allowing ourselves to become, well, less smart? We’re certainly becoming more reliant on technology that’s for sure, and allowing more and more “things” to think and act for us. Enter … the Internet of Things. The Internet of Things (IoT) is the network of p
    0 views
    Cybersecurity – it is no longer just ‘an IT Problem’
    GoldPhish
    • Jun 21, 2018
    • 3 min

    Cybersecurity – it is no longer just ‘an IT Problem’

    No business risk in the 21st century has created more challenges and concern to boardrooms and C-suites than cybersecurity risk. Reputations have been destroyed with customers and shareholders, and recent lawsuits have raised questions challenging the integrity of senior executives when faced with managing the impact of a cyber-attack. The media have been unforgiving and it is very clear that no nation, industry sector, company or individual is immune.  For this reason, it is
    0 views
    Identity Theft and How to Protect your Identity
    GoldPhish
    • Jun 12, 2018
    • 4 min

    Identity Theft and How to Protect your Identity

    There is only one you right? You’re unique. No one else like you. But despite this obvious fact, more than 16 million Americans were victims of identity theft in 2017 accordingly to an online survey by The Harris Poll. People pretending to be someone else (you) commit a crime. Would it surprise you to know that your identity – no matter how unique, is stored on dozens, if not hundreds of servers around the globe as your personal information. It’s out there; between Facebook,
    0 views
    1
    2
    • Home
    • Platform
      • Training Platform
      • Training Content
      • Phishing Simulator
    • Partner
      • MSP Partners
      • Insurance Partners
    • Pricing
    • About
      • Meet GoldPhish
      • FAQs
      • In The Press
    • Blog
    • Login
      • GoldPhish Platform
    NCSC Certified Logos_White.png
    APMG International Logo - no strap (white on clear).png
    CE Certified.png
    • GoldPhish | YouTube
    • LinkedIn
    • Twitter

    info@goldphish.com

    ​

    South Africa

    United Kingdom

    CYBER SECURITY AWARENESS

    FullColourGoldPhishIconLogo.png

    GOLDPHISH

    © GOLDPHISH LTD. All rights reserved.

    Terms and Conditions of Use  |  Privacy  |  Internet Security