Blog
DMARC: The Next Step in Email Hygiene and Security
Tue, 05/07/2024
In 1971, Ray Tomlison developed the first email service while working at The Defense Advanced Research Projects Agency (DARPA). This development changed how we communicated. However, even though this was an exceptional tool, it was not very user-friendly, requiring users to have specific software installed on their computers.In 1996, Sabeer Bhatia...
Blog
Pig Butchering Scam – What It Is and How to Protect Yourself
Mon, 03/25/2024
Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars.
Pig butchering has quickly become one of the most lucrative scams thanks to a mix of post...
Blog
Are Password Managers Safe to Use?
Mon, 03/18/2024
Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.
These new cyber threats led to the creation of...
Blog
Protect your loved ones from phishing, social engineering and other cyber attacks
Tue, 02/13/2024
Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering.
Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog
How Secure is Cloud Storage? Here are the Important Risks to Know
Fri, 12/29/2023
The rise of cloud storage has enabled much of the rapid digital transformation people have experienced since the onset of the pandemic. Forecasts project that today’s $83.41 billion global market will explode to $376.37 billion by 2029.
While cloud storage opens many opportunities to streamline processes and productivity, let’s keep in mind the arduous risks it poses.
Skyhigh Security found that...
Blog
Top 5 Data Security Incidents of 2023 and Predictions for 2024
Mon, 12/25/2023
As 2023 comes to an end, one thing is certain: cyber security is still a prime concern for most companies. While industries like healthcare and retail are still more heavily impacted than any other, a concerning trend has emerged in regard to the variety of organizations being targeted by cyber criminals.
This variety accounted for a staggering 20% increase in data breaches compared to 2022. More...
Blog
How Is the Digital Age Redefining Social Engineering's Playbook?
Mon, 11/06/2023
Social engineering has always been a prominent attack vector, skyrocketing as traditional hacks became more complicated. Even worse, hackers have begun perfecting their tactics to make them more reliable and damaging.One of the most dangerous variants is phishing, and with the help of AI, it's now becoming increasingly sophisticated. Let's discuss how AI is changing social engineering's playbook...
Blog
What Organizations Can Learn from the Toyota Cloud Breach
Mon, 09/25/2023
Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever.
According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries.
The auto industry has recently integrated cloud storage at all levels of their...
Blog
Why Transparency After a Data Breach is Important
Mon, 08/07/2023
It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come.
One of the biggest issues with data breaches, and what is often the most damaging outcome, is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...
Blog
Cyber Security Preparedness in a Hybrid World
Sun, 07/30/2023
Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm.
A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog
How to Report a Phishing Email Scam: What You Need to Know
Fri, 07/21/2023
Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year.The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams.Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...
Blog
Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?
Fri, 07/07/2023
Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization.
What is a Wi-Fi Pineapple?
A Wi-Fi...
Blog
How Scammers Are Using ChatGPT to Steal Credentials
Mon, 07/03/2023
Since its release, ChatGPT has been a hot topic, with more and more people growing to like it. Among the people who are enjoying the advantages of this AI tool are online scammers.
Hackers use ChatGPT's popularity to trick users into downloading malware and stealing their personal information, making it a hotbed for phishing scams.
Luckily, users can avoid falling prey to these scams and keep...
Blog
9 Examples of Social Engineering Attacks
Fri, 04/14/2023
All examples of social engineering take advantage of human nature, such as the willingness to trust others, to trick individuals into divulging sensitive information. Despite its prevalence, social engineering can be challenging to distill into a single formula. It’s one of the reasons 82% of data breaches involve the human element. Social engineering has become the backbone of many cyber threats,...
Blog
What's the Damage? The Truth About the Cost of Data Breaches
Wed, 04/05/2023
In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain.
According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more than once, costing...
Blog
What You Need to Know About the Google Drive Scam
Mon, 02/20/2023
Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog
6 Things to Learn from the Garmin Security Breach
Fri, 02/03/2023
As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies.
In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US.
Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average ransomware payout in...
Blog
Everything You Need to Know About Biometrics Hacking
Tue, 01/31/2023
Biometric authentication, such as face IDs, retina scans, and fingerprints, were introduced to our devices to increase security. At first, it felt like it was doing what it was meant to do. Plus, the convenience it brought with it was top-notch.
I mean, accessing your smartphone with your thumb? Logging into your bank account using your face ID? Amazing.
However, over the past few years,...
Blog
Cyber Attacks Pose the Biggest Risk to UK Banks – Bank of England
Thu, 01/12/2023
This financial sector’s reliance on computer systems and network has made it an attractive target for cyber attacks, now the biggest risk to the UK financial system.
In its latest Financial Stability Report, the Bank of England (BoE) agrees that cyber threats may be prevalent in 2023. The BoE said that it is working to strengthen defenses against cyber attacks.
The report identified three...