Remove Course Remove Examples Remove Government Remove Security
article thumbnail

What is Vishing? Definition, Examples and Prevention

IT Governance

Examples of vishing HR scam In this scam, an organisation’s HR manager receives a phone call from someone claiming to be from the bank. Phony government agency In this scam, the caller claims to be from a government department and asks you to confirm identification details. Get started The post What is Vishing?

article thumbnail

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. The cyber security industry has boomed in the past decade, providing fantastic opportunities for those interested in rewarding work that pays well and gives you room to grow. Do you want the security of a desk job?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. In this blog, we explain what information security and cyber security are, the differences between them and how they fit into your data protection practices. What is information security? This is cyber security.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

Data Governance for Smart Data Distancing

erwin

I hope you and your family are staying safe, practicing social distancing, and of course, washing your hands. During this coronavirus emergency, we are all being deluged by data from politicians, government agencies, news outlets, social media and websites, including valid facts but also opinions and rumors. Hello from my home office!

article thumbnail

Anatomy of a spear phishing attack – with example scam

IT Governance

Let’s take a look at how it works, along with an example to help you spot the clues of an attack. However, other than creating a false sense of security, the attack works in the same way as any other type of phishing scam. An example of a spear phishing email. Here’s an example of a real spear phishing email.