Which Employees Are Most Vulnerable to Phishing Scams?

Phishing Scams

While phishing scams have been around for a long time, the last few years has seen them become an almost everyday occurrence in the workplace. Ironically, this is largely due to recent technological developments, which have seen most businesses adopt cutting-edge cybersecurity systems that are practically impossible for hackers to break into. As such, hackers […]

Read More

Hackers KRACK WiFi security

For ages, most people assumed that setting a strong password on their WiFi router was enough to prevent cyberattacks, but recent events prove otherwise. Two Belgian security analysts have found a serious weakness in WiFi networks, called KRACK, that puts your wireless devices in danger. What is KRACK? Simply put, KRACK, short for ‘key reinstallation […]

Read More

How to Train Your Employees to Keep Your Company’s Data Safe

Company’s Data Safe

Many successful cyberattacks are caused by human error rather than a problem with technology alone. While outdated operating systems and ineffective firewalls and antivirus may also be to blame for a data breach, there’s no substitute for training your employees and making sure they’re fully aware of the risks facing your company. You can’t just […]

Read More

Equifax sheds light on incident response

What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same […]

Read More

How to Protect Your Business from Cyber Extortion

Cyber Extortion

A relatively new type of malicious computer program known as “ransomware” has become a global epidemic affecting businesses of all sizes. This fast-spreading threat has grown so quickly that it’s become a $5 billion industry according to estimates by cybersecurity experts. As several high-profile attacks this year have demonstrated, not even small businesses are immune. […]

Read More

Office 365 users face new phishing scam

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on. What makes it different from […]

Read More

How to Identify Malicious Emails at a Glance

[img src=”/wp-content/uploads/2017/08/blog-img-Proofread-Article.jpg” class=”aligncenter”] If you are reading this, chances are that you have seen suspicious emails in your email Inbox. Everyone does. Whatever you do – avoid clicking hyperlinks or downloading attachments whenever possible. If you’re not specifically expecting to receive it, then don’t open it. At one time or another, everyone has received an […]

Read More

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started […]

Read More
1 2 3 4 5 7