The forgotten aspect of Cyber Security.

There is one aspect of security that is all too often forgotten when speaking about security in the IT sector, and that is social engineering.
When we think about security we often think about various topics, there are the obvious ones like physical security and having strong passwords that should be changed regularly, there are countless policies and best practices out there that can help you secure your environment. The one thing that is very difficult to protect against and that is the social aspect. Famed hacker Kevin Mitnick wrote a book titled "The Art of Deception: Controlling the Human Element of Security" in which 14 out of the 16 chapters are dedicated to social engineering. This is a notorious hacker that could have chosen countless tops to write about but he saw this to be such a big part of security that he dedicated a large part of his book to it.

Phishing has been on the rise in the last couple of years. Phishing is the process an attacker might take to gain access to your private information by impersonating a legitimate department in your organization by email or phone
These days it is hard to distinguish between a legitimate source and a fake oneAttackers use the built-in trust that we have with fellow colleagues in our work environment to get us to install unwanted software that can be used to steal information.
The first thing to do on how to avoid the risk of being caught out by these attacks follow a familiar pattern of not opening emails and other communications that you are not certain of the authenticity. 

Internet of Things (IOT) The Internet of Things (Internet of things) is a new phenomenon in Information Communication Technology it has arrived and seems it is here to stay for the unforeseeable future. According to an article written by Peter High in Forbes magazine it ranks high among one of the top strategic Information Technology trends that are growing at a rapid rate (High, 2013). Internet of things can be defined as a concept where everyday devices are implanted with electronics, sensors, connectivity and software to enable them to exchange data and information about the current state, their location and the environment with other connected devices or it can simply be defined as a network of devices with aim of coordinating communication between the devices themselves and humans. Through using sensors the devices are made smart and are able to communicate, generate and transmit data.  (‘What is Internet of Things - Definition from’, 2014) Picture1.png
Fig 1. Internet of things                                           (‘Security in the Internet of things - Internet of Things’, no date)




There is no formula for the perfect folder structure. Each business is different, so your file structure should reflect how your specific business and employees work.

The most effective folders structures are easy to use, so everyone can intuitively find the files they’re looking for. If it’s too complicated, it will become a chore to organize, and no one will want to do it.
Keep in mind that a good file structure should work for everyone in your organization, not just you. Other people may not search for a file the way you do, and you don’t want to frustrate everyone else in your company.
Your ultimate goal is to create a logical hierarchy that gives every file a home, making things easy to find and impossible to lose. Here are a few tips and best practices to help you do this:

I.T has evolved at an unbelievable rate over the last 20 years, and if you are still stuck in the old way of doing things you are doing yourself and your company a great disservice.


If we look at the history of technology and just think for a moment how far we have come it is just astounding.


We can think of many examples of how far we have come with simple things like calculators, the earliest electronic calculators took up entire rooms with early functionality of basic addition and subtraction. Jump forward to 1989 and the first commercially available tablet was released. It was released by a company called GriD Systems and had a full touch screen and ran MS-DOS 3.3. Jump forward again to 1994 and we have the first Smart phone,

Page 1 of 3