
The New Cyber Reality: Identity, Extortion, and Automation
Cybercrime today has become about business models and automation rather than direct hacking and espionage.

Cybercrime today has become about business models and automation rather than direct hacking and espionage.

Ah, the irony!

Just how safe is it to store passwords in your browser’s password manager?

Our plain-speaking duo celebrate Sysmas, because ’tis the season to be thankful for the Sysadmins and SOCstars who keep us safe.

So many ways to publish rogue content for free!

Passwords are dead! Long live passwords! (We’re stuck with them for a while yet.)

We burrow into a real-life smishing scam, so you don’t have to.

Phishing, meet Vishing, and Quishing, and Smishing. We help you tackle the lot of them.

Do you back yourself to spot the scams that drop into your email inbox?
Could you teach your friends, family and colleagues to do the same?

We take a look at how cybercriminals go about scamming both purchasers and suppliers, and what you can do to protect yourself and your business.

Strategies for Safe and Private Communication for Organizations Malware and phishing scams aren’t the only cybersecurity risks that emails pose. The content of the emails themselves can be its own risk factor. Email content can include a treasure trove of exploitable information for cybercriminals. Employees may send passwords or social security numbers via email or share sensitive company information with no way of retracting the email once it’s sent. John Podesta, Hillary Clinton’s campaign manager in 2016, had his Apple […]

Phishing remains one of the most prominent attack vectors in use today. According to the Cybersecurity and Infrastructure Security Agency (CISA), over 90% of all cyber attacks begin with phishing. Two core reasons for phishing’s prominence are: By the end of Q4 2022, the number of phishing attacks worldwide spiked to over 1.35 million. Phishing is often the first step in far more sophisticated attacks, such as: Investing in fortifying your business against phishing attacks is one of the more […]

Enterprises are attractive, high-value targets for hackers; and, because enterprises often have more employees and a more complicated environment, protecting against phishing and social engineering attacks is even more difficult. The Dropbox breach of late 2022 is a prime example of this weakness. Hackers emailed a large number of Dropbox employees, directing them to a malicious website where their credentials were stolen. This kind of risk is more common than not. According to the 2023 Verizon Data Breach Report, 74% […]

Email is the second-most common vector for cyberattacks, according to the latest data breach report from Verizon while IBM’s Cost of a Data Breach report for 2023 indicates that Business Email Compromise (BEC) attacks, one type of email attack, resulted in an average loss of $4.67 million. Clearly, these attacks are succeeding against organizations. However, by following a few best practices, you can prevent many of the most common email-based cybersecurity incidents. 1. Invest in email/spam filters A sophisticated email […]

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






