


Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters. This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.
The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.
Know more details about this case here.
In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.
Access the challenge here.
Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.
To minimize this exposure, it's important to adopt some key digital safety practices, such as:
• Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.
• Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.
• Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.
Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.
If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.
Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.
We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.
Please find them on our internal SharePoint page and keep them handy for future reference.
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
email: information.security@celfocus.com
Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters. This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.
The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.
Know more details about this case here.
In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.
Access the challenge here.
Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.
To minimize this exposure, it's important to adopt some key digital safety practices, such as:
• Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.
• Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.
• Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.
Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.
If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.
Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.
We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.
Please find them on our internal SharePoint page and keep them handy for future reference.
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
email: information.security@celfocus.com
Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters. This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.
The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.
Know more details about this case here.
In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.
Access the challenge here.
Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.
To minimize this exposure, it's important to adopt some key digital safety practices, such as:
• Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.
• Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.
• Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.
Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.
If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.
Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.
We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.
Please find them on our internal SharePoint page and keep them handy for future reference.
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
email: information.security@celfocus.com


