Cyber Security

Cyber Security

Using our cyber security platform.
Are you getting too much spam? Do you feel you are getting too much spam in your email box? Is it clogging up not only your junk/spam box but also your inbox? Are the emails sometimes rather inappropriate or graphic? That being said, is spam ever appropriate? As a customer of Prystine, we can help, all...
What is Phishing? Phishing is a cybercrime in which cyber criminals send fraudulent emails to try to trick victims into revealing sensitive information (e.g. usernames & passwords, bank details), downloading malware (malicious software) or paying fake invoices. It comes under the category of social engineering where criminals use human interaction to achieve their...
What is a Human Firewall? When we talk about phishing security and combatting phishing, we often describe building a human firewall. But what actually is a human firewall? And how can you build yours? We'll cover those two questions in this article. A human firewall A human firewall is the human line of defence against...
What is Social Engineering? Social engineering is a form of cyber crime where criminals will use human interaction to try to steal sensitive data, money, gain privileged access or deliver malware. The criminals rely on manipulation or human error rather than vulnerabilities in software to achieve their goal(s). It's a broad category which encompasses...
Setting up 2FA (2 Factor Authentication) on your website In this article, we'll be running through the steps to set up 2 Factor Authentication (2FA) on your WordPress website. If you're a client of Prystine, you can skip straight to the 'Choosing a 2FA Authenticator App', if you already have an authenticator app downloaded, you can skip to 'Enabling...
How can I allow-list your IP addresses? Allow listing is an important procedure to ensure that our simulated phishing emails do actually reach your inboxes. As you can imagine, email service providers and spam filters do a great job at stopping most phishing emails, the problem is, that includes our own simulated phishing emails. That's where allow-listing...