ISO 27001 Compliance Checklist: The Documentation Required

ISO 27001 Checklist

Documenting your information security management system (ISMS) for evidence of compliance with the ISO 27001:2022 standard can be confusing as it is not clear which documents are mandated and which are discretionary. Consequently, most of us overcompensate and produce far more paperwork than we need causing redundant and conflicting policies to confuse our stakeholders, staff […]

What are the Different Types of Penetration Testing?

If you’re considering a penetration test to identify and fix vulnerabilities within your business, you might not know which type of pen test is best for you. In this article, we explore the types of penetration testing available, and what they are best for. What are the Different Types of Penetration Testing? Risk Crew offers […]

How Do You Conduct an Information Security Risk Assessment?

Information security risk assessments are crucial for any businesses that deal with any sensitive information that could potentially cause harm if accessed, shared, modified, or deleted. In this article, we cover how your business can benefit from a security risk assessment, how they are conducted, and how you can use the assessment findings to improve […]

10 Social Engineering Attacks You Need to Know

social engineering attacks

Simply put — social engineering works. Ask any Threat Actor in the business. Social engineering was behind more than 95% of the attacks reported last year by Purplesec. Consequently, educating your staff on what it is and how to spot it is nothing less than critical. Here are the top 10 most common types of […]

How To Write Phishing Emails

how to write a phishing email

Year after year, statistics show phishing attacks continue to rise. Why? Because they work, and this simple attack brings results. Consequently, this attack has evolved and become more sophisticated and harder to identify. Gone are the days of the error-filled 419 emails from a Nigerian Prince requesting your account details to hide money offshore. Instead, […]

Social Engineering Techniques – Hacking Human Behaviour | Risk Crew

Social Engineering Techniques

Social engineering is a term used for a wide variety of activities used by threat actors to manipulate or trick end users into bypassing security controls or providing sensitive information (such as login credentials) — that they then use to obtain unauthorised access to the systems they target. In today’s digital landscape, social engineering has […]

How to Outsmart the DarkSide Ransomware Group

DarkSide Ransomware

The DarkSide Ransomware Group is one of the many gangs that continue to rebrand themselves while expanding to gain more intelligence in 2022. So, is there any way to outsmart these groups? It almost seems like a losing battle. However, a strong defence can be created within your organisation, but first, it’s important to start […]

Risk Crew