Feb 1, 2020 | Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, DeepFake, Employees, Employees, Hackers, Hacking, Hacking, HR, Human Element, Identity Theft, industrial espionage, Insider Threat, Internet, Malware, Malware, MFA, Patching, Phishing, Phishing, Psychology, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology
Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Feb 1, 2020 | Attack Vectors, Audio-Visual Data, Best Practices, Biometrics, Business, Corporate Reputation, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, CyberTraining, DeepFake, Employees, Employees, Executives, Extortion, Hackers, Hacking, Hacking, Human Element, Impersonation, Incident Response, industrial espionage, Internet, Market Value, Marketing Manipulation, Patching, Radio Show, Radio_Show, records, scam, Security, Security, Security Alerts, Social Engineering, Technology, Updates
Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations. Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...
Jan 18, 2020 | Business, Cyber breaches, Cybercrime, Cybersecurity, CyberTraining, Data Assets, Employees, Employment, Human Element, Identity Theft, Insider Threat, Internet, Passwords, Phishing, Phishing, Privacy, Radio Show, Radio_Show, Security, Smishing, Technology, Vishing, Vulnerabilities
Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...
Jan 18, 2020 | Applications, Best Practices, Business, Business Email Compromise, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, Economic Disruption, Education, Employee Training, Employees, Employment, Exploits, Fines and Penalties, Government, Hackers, Hacking, Hacks, Insider Threat, Internet, Malware, MFA, Nationstates, Organized Crime, Phishing, Phishing, Phishing, Policies and Procedures, Radio Show, Radio_Show, scam, Security, Security, Smishing, Social Engineering, Social Media, Social Media, Social Networking, Technology, Threats, Tracking
Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Jan 18, 2020 | Anti-Virus, Applications, Applications, Attack Vectors, Audit Logs, Backup, Best Practices, browsers, Business, Business Email Compromise, Compliance, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data, Data Assets, Data Storage, Email, Employees, Employees, Fines and Penalties, Firefox, Government, Hackers, Hacking, Hacking, Hacking, Intellectual Property Theft, Internet, Legacy, Legacy Systems, Liability, Malware, Malware, Nationstates, Networking, Passwords, Patches, Patching, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware Attack, safety, Security, Security, Security Alerts, Signature-Based, Software, Technology, Third - Party, Updates, Updates, VPN, Vulnerabilities, Zero-Day
Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Dec 19, 2019 | Applications, Audit Logs, Best Practices, Business, cell phones, credentials, Employees, Employees, Intellectual Property Theft, Internet, Malware, Mobile Phones, Patching, Radio Show, Radio_Show, Regulatory Compliance, safety, Security, Security, Security Alerts, spying, Technology, Updates
Business Computers Should Only Be Used For Business If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...