• Log In
  • Support

    Shopping Cart

    No products in the basket.

    Sign in
    • Log In
    • Support

    Author: steven@theantisocialengineer.com

    Bio

    Sharing Information On Social Media

    Criminals look for information about their victims online, before trying to ‘hack’ them. We should be careful with what we share online, especially personal details…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Analysing Links

    Criminals may often ask you to visit a link as part of a social engineering attempt, such as phishing. This could be an attempt for…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Raising The Alarm

    When criminals strike, it’s important to warn others so that damage is limited. Criminals may send emails to the organisation in order to get people…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Secure Data Disposal

    Secure data disposal aids in the mitigation of data breaches and keeps personal data safe. When handling sensitive documents, simply discarding them in the general…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Clear Desk Tips

    Your desk is a haven for information that would be precious to criminals.  Confidential documents and files, spare or unused devices and keycards are all…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Lock Your Computer

    Locking the screen of your devices will help secure the information that not only belongs to the organisation, but also relates to you. Any malicious…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Staff Identification Tips

    Large organisations can often have so many staff that it’s hard to remember who everyone is. But asking someone for identification if you haven’t seen…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Tips To Stop Tailgating

    Tailgating is an easy technique for criminals and social engineers to gain access to buildings or areas they shouldn’t be in. If done effectively, tailgating…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Install CCTV in the Workplace

    Installing CCTV may deter criminals and capture evidence for criminal convictions, however, there are certain things that you must remember before installing CCTV in the…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Validate A Safe Website

    An increasing amount of life’s processes are becoming virtual, from paying tax to booking in at the hairdressers. Criminals will deceive you in order to…

    steven@theantisocialengineer.com 03/08/2019
    0 Comments

    Communications

    • Reporting Phishing
    • Checking SSL Certificates
    • Creating Strong Passwords
    • SMShing Information
    • Making Safe Payments
    • Setting A Secure Password
    • Locking Doors
    • Using A VPN
    • Antivirus and Endpoint Protection
    • Location Risks

    RSS NCSC Reports

    • Impact of AI on cyber threat from now to 2027 02/05/2025
    • Vendor Security Assessment 12/03/2025
    • Threat report on application stores 12/03/2025
    • The threat from commercial cyber proliferation 12/03/2025
    • The near-term impact of AI on the cyber threat 12/03/2025

    Categories

    • 2 Minute Shorts
    • Awareness
    • Financial
    STOP · THINK · PROTECT
    © 2025 Ultima Business Solutions Limited - Privacy Policy - Terms

    , let's be social!