cyberanges's profile picture.

cyberanges

@cyberanges

Joined March 2019
Similar User
OnNetServices's profile picture. Counter Cyber Operations, Incidence Response, Breach Readiness, Threat Intelligence, Adversary Pursuit, CNE/CNA/CND info (at) https://t.co/hJ9W7oDYdS

@OnNetServices

Defte_'s profile picture. Hacker, sysadmin and security researcher @OrangeCyberdef 💻
Calisthenic enthousiast 💪 and wannabe philosopher https://t.co/SqDDhIGGGh 📖
🔥 Hide&Sec 🔥

@Defte_

code_cap's profile picture. Chief CTI at OnNet Group

@code_cap

IdefendAfrica's profile picture. Idefend Africa, A Cyber Security Community, We Defend Orgs.

@IdefendAfrica

ANeilan's profile picture. 33. | security researcher. | team hashmob | keybase: w00dsman | https://t.co/NRNCI1zaJo | CashApp; $ANeilan (find me on the other place)

@ANeilan

Myk_Felix's profile picture. 0s & 1s

@CyberSpeakLC @CyberInAfrica #CyberInAfrica

@Myk_Felix

brian_rabary's profile picture. AI programmer | machine learning | tech

@brian_rabary

ikuamike's profile picture. • Curious about Cyber Security
• CTF Player @fr334aks
• Pentester
• Co-Founder @BSidesNairobi

@ikuamike

chuksjonia's profile picture. Gamer, Coder, Reader, Writer, Author, Former CNOer, Cyber Defense Operator, Founder OnNet Group; CEO OnNet Group @OnNetServices, learning screenwriting

@chuksjonia

shellcode254's profile picture. Appsec, Logic is my big interest. Cyber Security Lead, Bitwise Digital Solutions

@shellcode254

mortaltechniq's profile picture. Part time nerd | Beyond a script kiddy | Guardian of the Web : Vol 2 | More listening, less speaking | I Think Pad | co-founder @BSidesNairobi

@mortaltechniq

erikky_Trivium's profile picture. Laptop Repair and accessories. Metalhead. Ras. Here for all of it
65H5X78C

@erikky_Trivium

TNOHparasociety's profile picture. 👋Rae here! We teach beginners to paranormal investigations. Tennessee and Ohio paranormal group. 👻 👽🌙🔮 Managed by @kittytreats

@TNOHparasociety

e_grampa's profile picture. Just a dude

@e_grampa

MercyWamuyu_'s profile picture.

@MercyWamuyu_

Need #Tutorials on #SQL Injection #vulnerabilities? We've got you covered here on our #CYBERRANGES platform. Register with us a app.cyberranges.com and Don't forget to subscribe. #cybersecurity #scenarios #training

cyberanges's tweet image. Need #Tutorials on #SQL Injection #vulnerabilities?

We've got you covered here on our #CYBERRANGES platform. 
Register with us a app.cyberranges.com and Don't forget to subscribe.

#cybersecurity #scenarios #training

Continuing our promise to offer you WEEKLY Community Webinars, Join us this Friday, 19th June 2020 from 18:00 for yet another Webinar on Basic #Linux Server Administration 101, hosted by #CYBERRANGES, an ongoing Series: Zero to Hero To Register visit: event.webinarjam.com/channel/crcomm…

cyberanges's tweet image. Continuing our promise to offer you WEEKLY Community Webinars, Join us this Friday, 19th June 2020 from 18:00 for yet another Webinar on Basic #Linux Server Administration 101, hosted by #CYBERRANGES, an ongoing Series: Zero to Hero 
 
To Register visit: event.webinarjam.com/channel/crcomm…

Undertake #Orchestration, #InternetService simulation, attack simulation, user activity #simulation, undertake competence management, #scenarios and content development and many more! Check Out #CYBERRANGES Today! Visit us at: cyberranges.com #cybersecurity

cyberanges's tweet image. Undertake #Orchestration, #InternetService simulation, attack simulation, user activity #simulation, undertake competence management, #scenarios and content development and many more!

Check Out #CYBERRANGES Today! Visit us at: cyberranges.com
#cybersecurity

Tips & best practices to help you train your employees on cyber security🥇 📌Avoid the blame game 📌Invest in training your employees 📌Prioritize cyber security awareness 📌Make #CyberSecurity a part of the employee induction process 📌Test your employees #CyberRanges

cyberanges's tweet image. Tips & best practices to help you train your employees on cyber security🥇

📌Avoid the blame game
📌Invest in training your employees
📌Prioritize cyber security awareness
📌Make #CyberSecurity a part of the employee induction process
📌Test your employees

#CyberRanges

Cyber Security Awareness: What is it? and what does it mean to You? A few thoughts 💭from our #SOC manager 👨‍💼Fabio and our #compliance consultants 👩‍💼Mary & Caroline Are You Cyber Aware? #CyberRanges #cybersecurity #awareness

cyberanges's tweet image. Cyber Security Awareness: What is it? and what does it mean to You?

A few thoughts 💭from our #SOC manager 👨‍💼Fabio and our #compliance consultants 👩‍💼Mary & Caroline

Are You Cyber Aware?

#CyberRanges #cybersecurity #awareness

When it comes to #cybersecurity awareness, the misconceptions and challenges that security professionals come across: #CyberSec #Awareness programs never work The programs are a failure, someone always ends up clicking the wrong link Awareness is just about human prevention

cyberanges's tweet image. When it comes to #cybersecurity awareness, the misconceptions and challenges that security professionals come across:

#CyberSec #Awareness programs never work 
The programs are a failure, someone always ends up clicking the wrong link
Awareness is just about human prevention

Did you Know? 95% of cybersecurity breaches happen due to human error? #Cybersecurity awareness trainings ensure that all your employees are equipped with required skills when it comes to dealing with #cybercrime both #online & #offline. #CyberRanges

cyberanges's tweet image. Did you Know? 

95% of cybersecurity breaches happen due to human error? #Cybersecurity awareness trainings ensure that all your employees are equipped with required skills when it comes to dealing with #cybercrime both #online & #offline.
 
#CyberRanges

Clean Desk Policy: What does it mean! According to the mandates of a clean desk #policy, the only papers that should be left out are ones relevant to the current project you are working on. All sensitive and confidential #information should be securely stored. #CyberRanges

cyberanges's tweet image. Clean Desk Policy: What does it mean!

According to the mandates of a clean desk #policy, the only papers that should be left out are ones relevant to the current project you are working on. All sensitive and confidential #information should be securely stored.

#CyberRanges

Is your biz struggling to achieve/maintain #SOC 2 #compliance? Check out top 5 tactical #bestpractices...🖋️👍🛡️ Create a dedicated #GRC function | Monitor the known & unknown Set up anomaly alerts | Implement detailed audit trails Make forensic #data actionable #CyberRanges

cyberanges's tweet image. Is your biz struggling to achieve/maintain #SOC 2 #compliance? Check out top 5 tactical #bestpractices...🖋️👍🛡️

Create a dedicated #GRC function | Monitor the known & unknown
Set up anomaly alerts | Implement detailed audit trails
Make forensic #data actionable

#CyberRanges

Top best practices while working on the Internet 🖥️🖱️ When in doubt, PAUSE , then ask❓! | Don't click on unknown attachments | Never share USER credentials | Know how to report any potential security events that can affect the company! #CyberRanges #cybersecurity #staysafe

cyberanges's tweet image. Top best practices while working on the Internet 🖥️🖱️

When in doubt, PAUSE , then ask❓! | Don't click on unknown attachments | Never share USER credentials | Know how to report any potential security events that can affect the company!

#CyberRanges #cybersecurity #staysafe

Identity Theft & Data Breaches #Identitytheft has become more sophisticated with time, simply putting on a work uniform or downloading a fake 🆔. Once a threat actor knows the 🔑 components of your life: an address📧 or DOB, it is very simple to assume your identity #CyberRanges

cyberanges's tweet image. Identity Theft & Data Breaches

#Identitytheft has become more sophisticated with time, simply putting on a work uniform or downloading a fake 🆔. Once a threat actor knows the 🔑 components of your life: an address📧 or DOB, it is very simple to assume your identity
#CyberRanges

DON'T WORRY WE'VE GOT YOUR SECURITY COVERED! Report security incidents to a network admin or your IT help desk immediately. When in doubt, ASK! #CyberRanges #cybersecurity #happylaborday


The #cybercrime economy💰is currently worth 1.5 trillion, #cyberattacks are more frequent and advanced than it has ever been. On Average, an attack occurs every 39 seconds🕰️on websites and the non-secure usernames, passwords used increase attackers chances at success #CyebrRanges

cyberanges's tweet image. The #cybercrime economy💰is currently worth 1.5 trillion, #cyberattacks are more frequent and advanced than it has ever been. On Average, an attack occurs every 39 seconds🕰️on websites and the non-secure usernames, passwords used increase attackers chances at success
#CyebrRanges

#CyberSecurity🛡Hacks 2020💪 📍Never say: "It won't happen to me" - Realize that your are as much a target as the entire organization 📍Deploy a dedicated firewall to protect your network against threats 📍 Practice sensitive browsing on your own devices #CyberRanges

cyberanges's tweet image. #CyberSecurity🛡Hacks 2020💪
📍Never say: "It won't happen to me" - Realize that your are as much a target as the entire organization
📍Deploy a dedicated firewall to protect your network against threats
📍 Practice sensitive browsing on your own devices
#CyberRanges

BEWARE: Here's what you need to know about #phishing. Don't be baited into losing your valuable #information Remember: If YOU see something, SAY something! #CyberRanges #CyberSecurity

cyberanges's tweet image. BEWARE: Here's what you need to know about #phishing. Don't be baited into losing your valuable #information

Remember: If YOU see something, SAY something!

#CyberRanges #CyberSecurity

Do's & Don'ts of Teleworking ✅ Do's ✔️Select trusted & reputable telework software vendors ✔️Beware of social engineering tactics 🛑Don't ✖️Share links to remote meetings, conference calls on open chat channels ✖️Open email attachments from unknown senders #CyberRanges

cyberanges's tweet image. Do's & Don'ts of Teleworking
✅ Do's
✔️Select trusted & reputable telework software vendors
✔️Beware of social engineering tactics

🛑Don't
✖️Share links to remote meetings, conference calls on open chat channels
✖️Open email attachments from unknown senders

#CyberRanges

Why #cybersecurity matters more than ever during the coronavirus pandemic: ✅More than 4K #ransomware attacks daily, 230K new #malware samples produced daily; 468K #spearphishing email attacks spotted, 9,116 of which were related to Covid-19 #CyberRanges

cyberanges's tweet image. Why #cybersecurity matters more than ever during the coronavirus pandemic: 

✅More than 4K #ransomware attacks daily, 230K new #malware samples produced daily; 468K #spearphishing email attacks spotted, 9,116 of which were related to Covid-19

#CyberRanges

#Endpoint🛡️#Security in the #Digital Age: Some healthy security habits you must develop on your commute to your home office each day 📌 Patch, Patch, #Patch 📌 Stay updated with your company online policies📌 Consistent Cyber Security Hygiene: VPN encryption & others📌 #StaySafe

cyberanges's tweet image. #Endpoint🛡️#Security in the #Digital Age:
Some healthy security habits you must develop on your commute to your home office each day

📌 Patch, Patch, #Patch 📌 Stay updated with your company online policies📌 Consistent Cyber Security Hygiene: VPN encryption & others📌 #StaySafe

Critical 💻IT policies & 🛠tools every biz needs📌to create, revise or implement for #remoteworking: Guidelines for Remote Workers | #VPN usage policy | Disaster recovery & business continuity plan | Risk management & home usage of company-owned equipment policy #CyberRanges

cyberanges's tweet image. Critical 💻IT policies & 🛠tools every biz needs📌to create, revise or implement for #remoteworking: Guidelines for Remote Workers | #VPN usage policy | Disaster recovery & business continuity plan | Risk management & home usage of company-owned equipment policy

#CyberRanges

To improve & rise your #Cybersecurity posture and awareness you don’t need to invest endlessly in new security tools? Research indicates 80% of data breaches can be prevented with basic actions: such as #vulnerability assessments, #patching & proper configurations!

cyberanges's tweet image. To improve & rise your #Cybersecurity posture and awareness you don’t need to invest endlessly in new security tools? Research indicates 80% of data breaches can be prevented with basic actions: such as #vulnerability assessments, #patching & proper configurations!

Loading...

Something went wrong.


Something went wrong.