Tag: Phishing

Cyberthreat Response Tips for Small and Midsize Businesses

Small and midsize businesses have unique challenges as they work to protect themselves from being victims of cyberattacks. Daniel Lowrie, a certified ethical hacker who has spent the last 20 years in the information technology field, spoke with Rob Carson, founder and CEO of Semper Sec, a company that builds security programs and navigates security […]

Cybersecurity Issues to Keep an Eye on in the New Year

With record-breaking attacks in 2021 according to Crowdstrike, end-users and organizations must remain vigilant to protect against cybersecurity threats. Gartner, an IT industry research firm, predicts that by 2025 more than 75% of organizations will face one or more attacks by bad actors due to the exponential growth in the threat landscape. According to an Identity […]

Spear Phishing vs. Phishing: 7 Ways to Protect Your Organization

Phishing attacks have ramped up since the start of the pandemic with the majority of workforces transitioned to a remote setting. Spear phishing has particularly seen an increase and can be even more harmful due to its targeted approach. Hackers target and personalize messages to a specific individual, group, or organization in a spear phishing […]

Fishing hook through Enter Key

Beware of Phishing Attacks—Actionable Advice to Protect Your Company’s Data

As the COVID-19 pandemic continues to unfold, we are all being forced to adjust our new daily routines, and this includes cybercriminals. Since the start of the crisis, security teams are reporting an overall rise in all types of cyberattacks, ranging from phishing, account takeovers, and even activating long-dormant ransomware attacks. Keeping in mind that […]

email compromise phishing concept

Preventing Business E-mail Compromise

Providing cybersecurity for an organization is challenging enough for IT professionals even when threats are understood. It gets more difficult if an employee is asked to do something that’s harmful for the company without realizing the source of the request is a cybercriminal. Business e-mail compromise (BEC) is an example of such a threat. Prevention […]

Image of unsorted first class mail

Reminder: Not All Phishing is High Tech

Security professionals have to prepare their organizations for any number of threats, both physical and cyber. As such, it’s imperative to create a comprehensive map of your business’s attack surface, and develop strategies that protect your assets, including people, infrastructure, and data. But with attention-grabbing headlines focusing on major security issues (active shooters, ransomware) it’s […]