Category: IT Security
-
Hacking the Human: The Weakest Link in the Cybersecurity Chain
One of the regular exercises I carried out as a former Agency Chief Information Security Officer in an statutory board was to conduct regular phishing exercises. For the uninitiated, phishing is defined by Meta.AI as: “… a type of cybercrime in which attackers send fraudulent communications, such as emails, texts, or messages, that appear to…
-
Shenanigans Seen by an ex-CISO (Chief Information Security Officer) Own Goals: Part II
[Disclaimer: This Post is based on a real incident I encountered but the writing was assisted with generative AI (ChatGPT) but edited by myself because the phrasing used by ChatGPT were not typically how I would phrase some of the experiences.] It started with two emails from students, and little did I know, it would…
-
Confessions of an ex-CISO (Chief Information Security Officer)
Before became self-employed, my last role was that of being an Agency Chief Information Security Officer or ACISO. The job title itself sounds grand and impressive, but the work was mostly cleaning up after the fairly basic mistakes by staff and vendors of simple IT security and cybersecurity breaches. It also involved answering to a…