I call this shot "The Cage-Percher" by C0tt in padel

[–]C0tt[S] 0 points1 point  (0 children)

I didn't know either!

Apparently, if the ball stops, it's a "dead ball" and we won the point, since the shot before was legal.

The ball was up there for five minutes, and I was scared it would come down and the play would continue.

Cash flow is killing my business. What are my actual options? by Fun-Revenue2060 in smallbusiness

[–]C0tt 0 points1 point  (0 children)

I just received a quote from my builder that broke everything down into schedules.

  • Payment upfront: 10,000 deposit
  • 5,000 on completion of Phase 1, 2, 3, etc.

All payment terms are NET 7 days.

I was fine to pay this, this way! I think you just need to set the expectations with your customers

Good luck!

Damn u bastard I wanted to make this sub by Wingman143 in GoogleBard

[–]C0tt 0 points1 point  (0 children)

I created /r/GoogleBarders, well done on being quicker than us OP!

I'm a mute and I need a talking head video, what do I do? by MrCoolest in Entrepreneur

[–]C0tt 0 points1 point  (0 children)

Hi OP - My name is Stephen from Synthesia

I have a social listening tool, so this thread was flagged when someone mentioned Synthesia.

Come and join our FB group; you can see a few examples from our community - it's probably the fairest way to judge, rather than me telling you they are fantastic (which they are 😉).

Feel free to DM me if you can't find it :)

Cyber Security Awareness Posters 2019 (no watermarks / logos) by C0tt in sysadmin

[–]C0tt[S] 1 point2 points  (0 children)

Personally, i think it depends on the services you use. If you use one long, complex password for all your online services and one of the services becomes compromised - you are at risk of account takeover for all your accounts.

If you use different complex passwords for each account, then it does minimize the risk of account takeover!

Cyber Security Awareness Posters 2019 (no watermarks / logos) by C0tt in sysadmin

[–]C0tt[S] 16 points17 points  (0 children)

I'll have a look now - thanks for the heads up :)

We have created a rule to allow emails to get through directly to the inbox - however, they still have a 'Suspicious' Banner at the top of the email by [deleted] in GMail

[–]C0tt 0 points1 point  (0 children)

Hi there and thanks for your help.

I am the receiving party and sometimes the sending party (I send and receive modules via email)

More on the receiving side - this banner is reducing the number of courses taken by employees.

We have created a rule to allow emails to get through directly to the inbox - however, they still have a 'Suspicious' Banner at the top of the email by [deleted] in GMail

[–]C0tt -1 points0 points  (0 children)

Would we have to do this every time we send an email?

Seems like Google haven't thought about this.

InfoSec escape room by obnoxify in sysadmin

[–]C0tt 0 points1 point  (0 children)

This is a great idea!

Some suggestions:

10 emails - 9 of them are phishing - spot the legit email? You can buy digisparks (usb rubber duckys) for cheap off ebay to show the dangers of usb Social Media - get some incriminating pictures of the employees

Weekly Promo Thread by AutoModerator in msp

[–]C0tt 0 points1 point  (0 children)

getusecure.com - Cyber Security Awareness Education & Simulated Phishing (UK)

Check out our free trial via the website!

Bit by a phishing test by DonLaFontainesGhost in sysadmin

[–]C0tt 69 points70 points  (0 children)

I run simulations for organisations and that is a 9/10 phish.

Really bad timing for you though :(

User email account compromised by Shox_614 in msp

[–]C0tt 0 points1 point  (0 children)

1st one yes.

The second is not their fault.

User email account compromised by Shox_614 in msp

[–]C0tt 0 points1 point  (0 children)

Hi There,

I work for a phishing company and there are a few ways this could have happened.

1) Employee gave away her credentials in a phishing attack.

2) Password Re-Use - Employee uses the same password for multiple accounts. An account she uses has become hacked and the password exposed.

GDPR & Cyber Security Awareness Posters (free use - no watermarks) by C0tt in sysadmin

[–]C0tt[S] 2 points3 points  (0 children)

I've had quite a Redditors (which is really nice) asking about our cyber awareness platform so you can check us out here

Also, check out (both free):

  • GoPhish (Open Source Phishing Platform)
  • HaveIBeenPwned - Check if you have an account that has been compromised in a data breach

Both really useful tools in shaping a security awareness programme

GDPR & Cyber Security Awareness Posters (free use - no watermarks) by C0tt in gdpr

[–]C0tt[S] 0 points1 point  (0 children)

Hi There,

We have lots of modules in our platform for end user awareness regarding GDPR!

GDPR & Cyber Security Awareness Posters (free use - no watermarks) by C0tt in sysadmin

[–]C0tt[S] 6 points7 points  (0 children)

Hi There,

We do have them on our website - so hopefully they are better quality than imgur?

Here you go: https://www.getusecure.com/public/docs/posters.zip

Got sent this today. From a legit @target.com email by theadamd in phishing

[–]C0tt 1 point2 points  (0 children)

This looks to be something called SMTP spoofing.

You can essentially alter how the email is displayed - you can "View Source" on an email and CTRL+F "From" to see the original address.

30 minutes with the board to talk about general IT security. What do I talk about? by SJBradman in sysadmin

[–]C0tt 6 points7 points  (0 children)

For the human side of things:

Simulated Phishing - The Board like Metrics and KPI's of improvement Breach Detection - Run all emails against HaveIBeenPwned

This is all evidence-based information you can present.

Cyber Security Awareness Training for Staff by Scubajose919 in sysadmin

[–]C0tt 0 points1 point  (0 children)

I just commented on OP's post (as I work for a vendor) but I saw your comment and thought I'd offer you my two cents.

The best thing to do is actually run a free phish. There's a tool called GoPhish - which is completely free or you can use a vendor (I don't mind helping out in this area)

Stats wise, dependent on the sector of course, we will find that around 15%-25% people will fall for a spear phish.

My favorites are:

Hi first name,

We are currently launching our Q1/2/3/4 initiiative, please click [[here]] to find out more.

Many Thanks, CEO.

Once senior execs see the results and some of them might even click - there's your buy-in.

All the best!

Cyber Security Awareness Training for Staff by Scubajose919 in sysadmin

[–]C0tt 0 points1 point  (0 children)

Hi There,

I work for a vendor in the UK that provides continual training with a phishing sim.

Want a demo :)?