Resources

Blog

DMARC: The Next Step in Email Hygiene and Security

Image In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers. ...
Blog

How to Create a Strong Password in 7 Easy Steps

Image On May 7th of every year, organizations worldwide remind their end users of the importance of a strong password. But with remote workforces becoming the new normal and a sharp increase in the digital information exchanged daily, strong password best practices must be top-of-mind year-round. Despite the increased public...
Blog

Are Password Managers Safe to Use?

Image Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.  These new cyber threats led...
Blog

5 Examples of Strong Passwords That Will Secure Any Account

Image Passwords, our digital keys, wield a quiet power today. They protect your personal and business information, making them prime targets for hackers. With this power comes responsibility and the ongoing struggle to keep our virtual lives secure. AI has also made accessing passwords easier for cyber criminals. Modern cyber...
Blog

Protect your loved ones from phishing, social engineering and other cyber attacks

Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering. Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of...
Blog

How Security Leaders Can Use Multi-Factor Authentication to Protect Sensitive Data

As cyber criminals discover new ways to harvest login credentials, usernames and passwords have become less effective at keeping malicious users at bay. Research shows there are over 15 billion stolen login credentials on the dark web, which criminals routinely use to steal sensitive information from modern organizations. With such a high volume of data breaches and...
Blog

131 Cyber Security Statistics: 2024 Trends and Data

Cyber security awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track. This list is a rundown of the most important statistics of the year, allowing you to get a...
Blog

How Secure is Cloud Storage? Here are the Important Risks to Know

The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029. While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses. Skyhigh...
Blog

11 Cyber Security Tips for the Holidays

E-commerce growth is expected to grow by 9.4% by 2024; by 2027, it’s forecasted to hit a whopping $8 trillion for the first time. More people shopping online means more opportunities for cyber criminals to strike. In fact, there’s a growing trend of cyber scams taking place during the holiday shopping spree. As we all get busy with our holiday shopping and preparations,...
Blog

Protecting Retail Businesses from Cyber Attacks

Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations. From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business....
Blog

What Organizations Can Learn from the Toyota Cloud Breach

Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever. According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries. The auto industry has recently integrated cloud storage at all...
Blog

Got Malware? The Risk of Buying This Smart ID Card Reader from Amazon

KrebsOnSecurity blog recently reported on a popular, low-cost Common Access Card (CAC) reader available on Amazon that came with drivers infected by malware. A compromised smart ID card reader can bring severe consequences to both government and private organizations. It gives hackers an easy backdoor means of infiltrating networks and systems, which can leave sensitive...
Blog

How to Protect Your Sensitive Information from Word Document Malware

If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks. These attacks are designed to deliver malware and ransomware to targeted systems. Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to...
Blog

5 Examples of Spear Phishing Attacks

When it comes to cyber crime, hackers like to locate the most high-value targets, whether it’s a piece of infrastructure or an individual with access to privileged information, all while expending the least effort possible. In most examples of spear phishing attacks, a criminal will send out targeted attacks via email to multiple users. In these emails, the attacker will use...
Blog

Top Examples of Malware Attacks

Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach. However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and...

Spear Phishing vs. Phishing: Everything You Need to Know

Spear phishing occurs when cyber criminals deploy targeted attacks against individuals and businesses alike via email. Using savvy tactics, hackers collect sensitive data about specific parties to construct messages that sound familiar and trustworthy. As its name implies, spear phishing falls under the larger umbrella category of phishing attacks that victimize end users and...
Guide

Protecting Your Data With a Strong Password Kit

What’s in the kit? Video - Security Awareness Training: Passwords Informative blog featuring tips and advice on How to Create a Strong Password in 7 Easy Steps Newsletter on tips and best practices for strong passwords Infographic with tips for creating a strong password ...
Blog

Password Safety - Empower Your Workforce To Protect Sensitive Data

Make Your Passwords Secure Again! In connection with the most recent security breaches, let's take a few minutes to highlight the importance of talking with your employees about password safety. Cyber criminals strive to infiltrate our networks and weak passwords are a way in. Empowering your employees with cyber security awareness training is an excellent way to teach best...
Blog

Impending breach notification laws highlight importance of security awareness

New data breach notification proposals from President Obama and other political leaders will only exacerbate the impact of these incidents. The stakes surrounding cybersecurity aren’t just increasing – they are expanding. For years now, business leaders have understood that data breaches are a serious issue, one which firms must do everything in their power to avoid. After...