In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Why Executive personal identifiable information Exposure Demands Continuous Monitoring
🕵️ Executive PII Risks Require Constant Monitoring
High-profile executives are prime targets for cybercriminals.
Even minor exposures of executive personal information can trigger phishing, fraud, or social engineering attacks that jeopardize both the individual and the organization.
Static security checks are no longer enough. Executives often share data across multiple devices and personal channels, creating constant exposure opportunities.
Continuous monitoring detects leaks, unusual activity, and potential misuse before full-scale breaches occur.
AUMINT.io provides real-time executive PII monitoring, alerting, and actionable insights to secure both the executive and enterprise.
Protect your leadership and organizational security today: https://calendly.com/aumint/aumint-intro
#Cybersecurity #ExecutiveProtection #FraudPrevention #SocialEngineering #CISO #AUMINT #EnterpriseSecurity
📊 CISOs: Essential Free Risk Assessment Templates 📊
Risk assessments are the backbone of any cybersecurity strategy. But building them from scratch takes time, effort, and expertise. Luckily, there are free templates that help CISOs identify, analyze, and mitigate risks efficiently.
Here’s a list of must-have free risk assessment templates for CISOs:
1️⃣ NIST Cybersecurity Framework Risk Assessment Template – Aligns risks to NIST CSF categories for structured analysis.
https://www.nist.gov/cyberframework
2️⃣ CISA Risk Assessment Templates – Ready-to-use templates for critical infrastructure and IT systems.
https://www.cisa.gov/publication/cyber-essentials-risk-assessment
3️⃣ ISO/IEC 27005 Risk Assessment Template – Comprehensive framework for information security risk management.
https://www.iso.org/standard/75281.html
4️⃣ SANS Security Policy Templates – Includes risk assessment worksheets for different business units.
https://www.sans.org/information-security-policy/
5️⃣ OWASP Risk Assessment Template – Focused on application and web security risks.
https://owasp.org/www-project-risk-assessment/
6️⃣ ISACA Risk IT Templates – Aligns IT risk with business objectives and compliance requirements.
https://www.isaca.org/resources
7️⃣ Cloud Security Alliance (CSA) Cloud Controls Matrix – Template for assessing cloud service provider risks.
https://cloudsecurityalliance.org/research/
Using these templates allows CISOs to standardize assessments, communicate risk effectively to stakeholders, and prioritize mitigation strategies.
Want to see how human factors impact risk beyond technology? 🧠 AUMINT.io provides social engineering simulations that highlight hidden vulnerabilities in your organization.
📅 Book a free intro call: Schedule here
💾 Save this post and start streamlining your risk assessments today!
#CISO #RiskAssessment #CyberSecurity #InfoSec #HumanRisk #AUMINT
Top Cybersecurity Risks Threatening Healthcare in 2025
🏥 Healthcare Faces Rising Cybersecurity Threats
Ransomware, phishing, and unpatched software are putting hospitals and clinics at unprecedented risk. Sensitive patient data and critical medical systems are prime targets for cybercriminals.
Even small lapses in cybersecurity hygiene can lead to devastating consequences, from compromised patient safety to regulatory fines. Legacy systems and complex vendor networks amplify these vulnerabilities.
Proactive resilience is essential. Continuous monitoring, social engineering simulations, and comprehensive vendor risk assessments can identify threats before they escalate.
AUMINT.io equips healthcare organizations with advanced tools and insights to fortify defenses, mitigate risk, and train staff to recognize and respond to attacks.
Take the first step to secure your healthcare operations today: https://calendly.com/aumint/aumint-intro
#HealthcareSecurity #Cybersecurity #SocialEngineering #FraudPrevention #AUMINT #CISO #HospitalIT #HealthcareIT