Which Employees Are Most Vulnerable to Phishing Scams?
While phishing scams have been around for a long time, the last few years has seen them become an almost everyday occurrence in the workplace. Ironically, this is largely due to recent technological developments, which have seen most businesses adopt cutting-edge cybersecurity systems that are practically impossible for hackers to break into. As such, hackers […]
Google releases year-long security study
Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details. The results From March 2016 to March […]
Hackers KRACK WiFi security
For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger. What is KRACK? Simply put, KRACK, short for ‘key reinstallation […]
Your passwords are not secure
A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines […]
How to Train Your Employees to Keep Your Company’s Data Safe
Many successful cyberattacks are caused by human error rather than a problem with technology alone. While outdated operating systems and ineffective firewalls and antivirus may also be to blame for a data breach, there’s no substitute for training your employees and making sure they’re fully aware of the risks facing your company. You can’t just […]
Equifax sheds light on incident response
What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same […]
How to Protect Your Business from Cyber Extortion
A relatively new type of malicious computer program known as “ransomware” has become a global epidemic affecting businesses of all sizes. This fast-spreading threat has grown so quickly that it’s become a $5 billion industry according to estimates by cybersecurity experts. As several high-profile attacks this year have demonstrated, not even small businesses are immune. […]
Office 365 users face new phishing scam
With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on. What makes it different from […]
How to Identify Malicious Emails at a Glance
[img src=”/wp-content/uploads/2017/08/blog-img-Proofread-Article.jpg” class=”aligncenter”] If you are reading this, chances are that you have seen suspicious emails in your email Inbox. Everyone does. Whatever you do – avoid clicking hyperlinks or downloading attachments whenever possible. If you’re not specifically expecting to receive it, then don’t open it. At one time or another, everyone has received an […]
Locky-type ransomware is attacking systems
A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started […]