Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year

Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks.  In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...
Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business   If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Malcare WordPress Security