Resources

Blog

130 Cyber Security Statistics: 2024 Trends and Data

Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog

Are Password Managers Safe to Use?

Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased. These new cyber threats led to the creation of...
Blog

Protect your loved ones from phishing, social engineering and other cyber attacks

Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering. Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog

Top 5 Data Security Incidents of 2023 and Predictions for 2024

As 2023 comes to an end, one thing is certain: cyber security is still a prime concern for most companies. While industries like healthcare and retail are still more heavily impacted than any other, a concerning trend has emerged in regard to the variety of organizations being targeted by cyber criminals. This variety accounted for a staggering 20% increase in data breaches compared to 2022. More...
Blog

8 Examples of Vishing and How to Beat Them

Less of a cyber security threat and closer to a scam, Vishing refers to attempts to steal information or money over the phone by convincing the victim. These calls often use personal data acquired through previous cyber attacks to gain their victim’s trust. This type of threat is definitely on the rise—especially with the help of AI. Like many other hacks and scams, Vishing is a popular attack...
Blog

What Organizations Can Learn from the Toyota Cloud Breach

Cloud storage has revolutionized how organizations collaborate internally, allowing them to store data conveniently and cheaper than ever. According to a recent survey of technology leaders, 93% of respondents said their company was “mostly cloud,” reflecting the hold that this technology has on all industries. The auto industry has recently integrated cloud storage at all levels of their...
Blog

Why Transparency After a Data Breach is Important

It’s one of the scariest outcomes of a cyber attack. A data breach’s effect can easily bankrupt a company, and even if appropriately handled, its consequences are often felt for months or years to come. One of the biggest issues with data breaches, and what is often the most damaging outcome, is the loss of trust from customers. After all, if a breach happened once, how do you know it won’t...
Blog

How to Report a Phishing Email Scam: What You Need to Know

Over 3.4 billion phishing emails are sent out to unsuspecting recipients daily. At this rate, over 1 trillion email scams are deployed in one calendar year.The sheer enormity of these numbers makes it easier to understand how and why employees become victims of phishing email scams.Their typical email inbox is overflowing with emails from colleagues, partners, friends, family, third-party...
Blog

Wi-Fi Pineapple: What Do You Know About this Cyber Security Threat?

Carrying out a cyber attack is becoming more and more accessible. For a meager price of $99, anyone can now buy a platform to steal personal data and pose a cyber threat to organizations worldwide. This accessibility is made possible through the Wi-Fi Pineapple. Learn about this new cyber threat in this article and get tips on protecting your organization. What is a Wi-Fi Pineapple? A Wi-Fi...
Blog

How Scammers Are Using ChatGPT to Steal Credentials

Since its release, ChatGPT has been a hot topic, with more and more people growing to like it. Among the people who are enjoying the advantages of this AI tool are online scammers. Hackers use ChatGPT's popularity to trick users into downloading malware and stealing their personal information, making it a hotbed for phishing scams. Luckily, users can avoid falling prey to these scams and keep...
Blog

5 Examples of Business Email Compromise Attacks

Most skilled cyber attackers don't need exploits to access an enterprise network. In many examples of Business Email Compromise (BEC) attacks, all it takes is a simple phishing scam to trick the user into handing over their login credentials. In these attacks, a hacker will send an employee a phishing email posing as a trusted individual to trick the victim into handing over sensitive information...
Blog

What's the Difference Between Smishing and Vishing?

An urgent voicemail message from the tax department. A text message from Microsoft tech support warning you about a problem with your computer. A caller asking you to confirm your mailing address and credit card number so you can collect your free prize. A text message requesting your confirmation of an Amazon shipment. These are all examples of smishing and vishing cyber attacks. They have...
Blog

The Definitive Guide to Cyber Security in Cryptocurrency

Even after years of business evolution; it’s shocking that safe, quick and trackable payments are still often such a struggle for many companies around the world. Banks are often slow-moving institutions that are late to embrace technological improvements, and currencies have been increasingly fickle in recent years. This situation is what allowed cryptocurrency to go from the pipe dream of an...
Blog

What's the Damage? The Truth About the Cost of Data Breaches

In today's interconnected world, organizations are responsible for their cyber security practices as well as those of their third-party vendors. With increasingly complex risk management scenarios, the impact of a data breach can be catastrophic for an entire supply chain. According to a study by IBM, 83% of U.S. companies who participated have experienced a data breach more than once, costing...
Blog

What You Need to Know About the Google Drive Scam

Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog

The Crypto Crash: How it Affects Cyber Security in 2023 and What to Do About It

The crypto market has been on a wild ride over the past few years, with prices soaring to all-time highs in 2017 and then crashing just as dramatically in 2018. And while the market has been relatively stable in recent months, many experts predict another crash in 2023. But what does this mean for cyber security? In this article, we’ll explore the potential effects of the crypto crash on...
Blog

6 Things to Learn from the Garmin Security Breach

As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies. In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US. Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average ransomware payout in...
Blog

Everything You Need to Know About Biometrics Hacking

Biometric authentication, such as face IDs, retina scans, and fingerprints, were introduced to our devices to increase security. At first, it felt like it was doing what it was meant to do. Plus, the convenience it brought with it was top-notch. I mean, accessing your smartphone with your thumb? Logging into your bank account using your face ID? Amazing. However, over the past few years,...
Blog

Cyber Attacks Pose the Biggest Risk to UK Banks – Bank of England

This financial sector’s reliance on computer systems and network has made it an attractive target for cyber attacks, now the biggest risk to the UK financial system. In its latest Financial Stability Report, the Bank of England (BoE) agrees that cyber threats may be prevalent in 2023. The BoE said that it is working to strengthen defenses against cyber attacks. The report identified three...
Blog

What You Need to Know About the 2022 Australian Cyber Attacks

There is a sharp rise in cyber attacks targeting businesses and organizations across Australia. The nature of these attacks ranges from ransomware and phishing scams to distributed denial-of-service (DDoS) attacks, with some estimates suggesting that the number of cyber incidents could be as high as one million per year. The financial cost of these cyber attacks is immense, with businesses and...