White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals.  Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world.  Even the most prepared organization have found themselves...
Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks.  In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...