KEY POINTS *The following statistics have been provided by our friends at the National Cybersecurity Alliance (NCA). As we embrace… Read more Let’s Go Phishing – 5 Tips to Recognize Phishing Emails
Tag: #phishing
One Phish, Two Phish, Red Phish, Blue Phish
KEY POINTS A 2021 study by Proofpoint identified that 74% of US organizations fell victim to a successful phishing attack… Read more One Phish, Two Phish, Red Phish, Blue Phish
What Is the Primary Purpose for Instituting a Security Awareness Program?
KEY POINTS Accenture notes that 85% of organizations have reported that they experienced phishing and social engineering attacks in 2019.… Read more What Is the Primary Purpose for Instituting a Security Awareness Program?
Staying Safe While Teleworking – A list Of Best Practices To Implement During A Pandemic
With the majority of the corporate world moving from working in the office to working remotely, cyber criminals are prepping… Read more Staying Safe While Teleworking – A list Of Best Practices To Implement During A Pandemic
What Does That Even Mean?!?!?!
Zero day this, APT that, no I don’t want to go Phishing! It seems like there’s a new buzzword thrown… Read more What Does That Even Mean?!?!?!
Where Can I Report Attempted Phishing Attacks?
Attempted phishing attacks via email or texts (also known as SMSishing) can be reported to the Federal Trade Commission and… Read more Where Can I Report Attempted Phishing Attacks?
Facebook Account Security Tips for Small Business!
Today’s set of tips comes from our friends at the National Cyber Security Alliance. While the video is intended for… Read more Facebook Account Security Tips for Small Business!
Is there a way to keep my Gmail information away from hackers?
In today’s day and age, a compromised email account can have a debilitating effect on an individual. We use email… Read more Is there a way to keep my Gmail information away from hackers?
Social Engineering Tactics To Protect Your data and privacy from Social Attacks
Here’s an easy to digest info graphic which provides some great tips for protecting your data and privacy from malicious… Read more Social Engineering Tactics To Protect Your data and privacy from Social Attacks
Machine learning: A key weapon in the cybersecurity battle
As hackers weaponize AI, cybersecurity professionals must fight fire with fire by using cognitive technology to identify & prevent attacks.… Read more Machine learning: A key weapon in the cybersecurity battle