Avoid what is Strong and Strike at what is Weak
Despite Firms’ Best Efforts, Security Vulnerabilities Are Increasing From the infamous Sony hack and other high-profile data breaches to Heartbleed, Shellshock and the new wave of mass mobile threats, 2014 was an historic (if woeful) year for cybersecurity. As a...
How Coronavirus is Raising New Business Continuity Phishing Challenges for InfoSec
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones? Cyber attackers are barraging businesses with phishing lures touting fake info about the Coronavirus. And although the lures may be fake, the security and...
How cybercriminals are using Microsoft to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...
Phishing scams top the threat list
A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...






