Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust

Business Email Compromise Group Charged in Bust   Eighty people have been charged for their roles in a massive and complex fraud operation that attempted to steal $46 million in business email compromise (BEC) and romance scams, according to the US Department of...
SMB Cyber Security and Audits. The Why’s, the How’s, and the steps…

SMB Cyber Security and Audits. The Why’s, the How’s, and the steps…

SMB Cyber Security and Audits. The Why’s, the How’s, and the steps… Why? To maintain your company’s “security hygiene.”  To identify critical weaknesses in your cybersecurity protection measures To Keep in Compliance with Industry...