Latest news

target
Awareness

“I’m not a tempting target for cybercriminals”: how this mindset may harm people and companies

Have you ever caught yourself thinking something like: “I’m not a tempting target, why would a cybercriminal want my data?”. Well, this false sense of security affects not only people, but companies, too, and is a real danger that may result in serious cybersecurity negligence.  After all, if an individual or organization believes they are […]

Read article
online dangers
Awareness

Online dangers that threaten children and teenagers: what are they and how can we avoid them?

Speaking metaphorically, we could say that the Internet is like a public square to which everyone has access. Unfortunately, this means that malicious actors are also likely to circulate on it. When it comes to online dangers, some of the most vulnerable audiences are undoubtedly children and teenagers. In an increasingly digital world, they must […]

Read article
best practices for secure file sharing
Cybersecurity

7 best practices for secure file sharing

File sharing has become an essential part of everyday work in the digital age. Whether it’s collaborating on projects, sending documents to clients or storing important data, exchanging information is an important part of the smooth running of a company. However, while it’s now very easy to share data, this also brings about significant risks, […]

Read article
human centric
Awareness

What is human-centric security and what are the benefits of this approach

Digital security is a current and ever-growing concern for both individuals and organizations. But the focus on technologies and automated systems alone often leaves out a crucial element: people. And that’s where the concept of human-centric security comes in, an approach that places human needs and behaviors at the core of security strategies. It is […]

Read article
organizing
Awareness

How organizing your digital life can protect you from cyber risks

In the connected world of today, our digital presence is an extension of ourselves. Every day, we sign up for different apps, social networks and websites to purchase products or services. And the truth is, it often only takes a few days for us to forget the account created on that platform, whether due to […]

Read article
awareness program
Awareness

How C-levels can contribute to a gamified awareness program

There’s no question that organizations have to maintain a continuous information security awareness program. And to ensure greater engagement and enjoyment by the entire body of employees, gamification is certainly the best way to go. One of the most common mistakes within companies, however, is to believe that the team responsible for creating and maintaining […]

Read article
security culture
Awareness

The importance of security culture to mitigate business risks

Truth be told, we live in an increasingly digitized world in which cybersecurity has become far more than an optional investment. Instead, it is seen as a necessity and a competitive differentiator. With the exponential increase in cyberthreats, organizations of all segments and sizes are susceptible to an array of digital threats, exposing themselves to […]

Read article
Social engineering
Awareness

Social engineering: what it is and how to identify it

Social engineering is a psychological manipulation technique used by criminals to persuade victims to reveal confidential information or to trick them into doing something. Social engineering is extremely effective because criminals, including cybercriminals, know that fooling people can often be much easier than circumventing physical or computer security barriers. You may wonder why people always […]

Read article
elicitation
Awareness

Elicitation: the polite and courteous technique of stealing sensitive information

It’s no use looking in the dictionary: the concept of elicitation in the context of information security is still relatively new, even in Brazil. Any dictionary defines elicit as “to extract, to bring out; to obtain; to trigger, to provoke; to deduce; to discover; to clarify”, but, let’s face it, it is a little hard […]

Read article
newsletter

Get the latest news on your email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers
    LinkedIn: linkedin.com/company/hacker-rangers