Blog
How to Protect Your Data from the Microsoft Office 365 Phishing Scam
Fri, 07/31/2020
Since December 2019, there has been a coordinated campaign of phishing attempts targeting Office 365 users. Cyber criminals have sent spoofed email, gathering the login credentials and payment details of Microsoft accounts in over 62 countries.
According to one report, despite a 42% reduction in phishing attempts in 2019, scams like this Microsoft Office 365 campaign remain a significant threat...
Blog
What the Twitter Hack Revealed About Social Engineering
Thu, 07/23/2020
Less than a week ago, Twitter fell victim to a monumental security breach that saw hackers successfully orchestrate a social engineering attack and take over high-profile Twitter user accounts, including world-renowned companies like Apple and business magnates like Bill Gates and Elon Musk.
The cybercriminals used that access to launch a bitcoin scam that generated over $120,000. The attack is...
On-Demand Webinar
On-Demand Webcast: The Five Stages of Being Phished
Mon, 11/18/2019
When falling for a phishing scam, users usually go through one or more emotional stages including; denial, anger, bargaining, depression and acceptance.
Watch now to learn more about:
The 5 stages and how they affect the impact of a data breach
Using a security awareness program to help users become cyber aware
The role of just-in-time training and phishing simulations in effectively...
Blog
5 Ways to Reduce the Risk of a Social Network Breach
Wed, 05/29/2019
Social networking overlaps corporate and personal lives, and so should the mission to create a culture of security awareness.
It’s true.
There was little – if nothing – any Facebook user could have done to prevent their passwords from getting exposed earlier this spring.
Just look at the facts of the case, said Theo Zafirakos, Chief Information Security Officer and Security Awareness Coach at...
Video
Ransomware: Move from Beware to Be Aware!
Tue, 12/04/2018
DURATION: 40 MINUTES
Do you fear that your organization’s data will be kidnapped and held for ransom?
It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware risks.
Do you have a...
Blog
Recent phishing attacks demonstrate widespread dangers
Tue, 11/24/2015
By this point, the dangers presented by phishing attacks are becoming increasingly well known. Business leaders recognize that information security awareness is critical for organizations of all kinds, and these programs need to focus heavily on phishing if firms want to remain protected in the current cybersecurity landscape.
Phishing attacks have become among the most dangerous forms of...
Blog
Employee error leads to Rogers Communications data breach
Tue, 03/24/2015
While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity.
Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Blog
Impending breach notification laws highlight importance of security awareness
Tue, 01/27/2015
New data breach notification proposals from President Obama and other political leaders will only exacerbate the impact of these incidents.
The stakes surrounding cybersecurity aren’t just increasing – they are expanding.
For years now, business leaders have understood that data breaches are a serious issue, one which firms must do everything in their power to avoid. After all, these incidents...
Blog
Scam by fraudsters – Ransomware
Wed, 07/10/2013
Ransomware is one the many scams that Internet users dread. Once this type of malicious program is installed, it asks the user for “ransom” to unlock the computer, using various pretexts and pretending to be a local police authority.
In one case, a user clicked on a malicious link and was bombarded with pornographic pop-ups. The user attempted to restart his computer, when he received a message...
Blog
Supplementary guide to achieving PCI-DSS compliance cloud computing
Tue, 05/28/2013
Cloud computing services require special attention in regards to information security and privacy. This is especially important when using credit card data while cloud computing in order to meet PCI-DSS ("Payment Card Industry – Data Security Standard") standards. To this end, the SSC ("Standard Security Council") published a document entitled “Information Supplement: PCI DSS Cloud Computing...