Latest news

human centric
Awareness

What is human-centric security and what are the benefits of this approach

Digital security is a current and ever-growing concern for both individuals and organizations. But the focus on technologies and automated systems alone often leaves out a crucial element: people. And that’s where the concept of human-centric security comes in, an approach that places human needs and behaviors at the core of security strategies. It is […]

Read article
organizing
Awareness

How organizing your digital life can protect you from cyber risks

In the connected world of today, our digital presence is an extension of ourselves. Every day, we sign up for different apps, social networks and websites to purchase products or services. And the truth is, it often only takes a few days for us to forget the account created on that platform, whether due to […]

Read article
awareness program
Awareness

How C-levels can contribute to a gamified awareness program

There’s no question that organizations have to maintain a continuous information security awareness program. And to ensure greater engagement and enjoyment by the entire body of employees, gamification is certainly the best way to go. One of the most common mistakes within companies, however, is to believe that the team responsible for creating and maintaining […]

Read article
security culture
Awareness

The importance of security culture to mitigate business risks

Truth be told, we live in an increasingly digitized world in which cybersecurity has become far more than an optional investment. Instead, it is seen as a necessity and a competitive differentiator. With the exponential increase in cyberthreats, organizations of all segments and sizes are susceptible to an array of digital threats, exposing themselves to […]

Read article
Social engineering
Awareness

Social engineering: what it is and how to identify it

Social engineering is a psychological manipulation technique used by criminals to persuade victims to reveal confidential information or to trick them into doing something. Social engineering is extremely effective because criminals, including cybercriminals, know that fooling people can often be much easier than circumventing physical or computer security barriers. You may wonder why people always […]

Read article
elicitation
Awareness

Elicitation: the polite and courteous technique of stealing sensitive information

It’s no use looking in the dictionary: the concept of elicitation in the context of information security is still relatively new, even in Brazil. Any dictionary defines elicit as “to extract, to bring out; to obtain; to trigger, to provoke; to deduce; to discover; to clarify”, but, let’s face it, it is a little hard […]

Read article
scam
Awareness

Life after a scam: what actions can be taken after falling victim to online fraud?

Unfortunately, falling victim to an online scam is an increasingly common reality nowadays. Scammers take advantage of people’s vulnerabilities to obtain personal and financial information.  If you or someone close to you has been a victim of cybercrime, our deepest sympathies. We are fully aware of just how frustrating this can be. On top of […]

Read article
information security risk management
Awareness

The importance of information security risk management

Investing in an information security risk management policy is a fundamental strategy to guarantee corporate security. The information stored by a company’s systems is valuable. It may include confidential data about customers, employees, finances, intellectual property, business strategies, and much more.  If this information falls into the wrong hands, the problems can be enormous: financial […]

Read article
C level
Awareness

C-levels: why they should support an awareness program

In the age of technology, security awareness programs are fundamental within any company and in any industry. After all, they propose training to reduce the likelihood of security incidents caused by human error by teaching best practices when it comes to using the Internet, electronic devices, and handling information.  It’s thus a little surprising that […]

Read article
newsletter

Get the latest news on your email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers
    LinkedIn: linkedin.com/company/hacker-rangers