Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog
Protect your loved ones from phishing, social engineering and other cyber attacks
Tue, 02/13/2024
Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering.
Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog
Protecting Retail Businesses from Cyber Attacks
Fri, 11/24/2023
Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations.
From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business. Unfortunately, all...
Blog
How to Develop Security Awareness Training
Mon, 10/09/2023
According to Valimail’s Spring 2019 Email Fraud Landscape, about 3.4 billion phishing emails are sent each day, making it one of the most common types of cyber attacks.
This number shows how crucial it is to train your employees so they can recognize and report malicious emails.
That’s where cyber security awareness training comes in. With the right training program, you can provide your...
Blog
8 Examples of Vishing and How to Beat Them
Mon, 10/02/2023
Less of a cyber security threat and closer to a scam, Vishing refers to attempts to steal information or money over the phone by convincing the victim. These calls often use personal data acquired through previous cyber attacks to gain their victim’s trust.
This type of threat is definitely on the rise—especially with the help of AI. Like many other hacks and scams, Vishing is a popular attack...
Blog
Risky Business: When Third-Party Troubles Become Your Own
Tue, 09/05/2023
Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations.
Especially when talking about large corporations—they collaborate with various other organizations or firms helping them manage and advance their operations.
These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers...
Blog
What's the Difference Between Smishing and Vishing?
Fri, 06/23/2023
An urgent voicemail message from the tax department.
A text message from Microsoft tech support warning you about a problem with your computer.
A caller asking you to confirm your mailing address and credit card number so you can collect your free prize.
A text message requesting your confirmation of an Amazon shipment.
These are all examples of smishing and vishing cyber attacks. They have...
Blog
How to Enhance Third Party Risk Management with Cyber Security Training
Mon, 06/12/2023
Did you know that on average, every company is connected to ten third-party businesses?
There’s the payroll services company that remotely manages employee wages. The Software-as-a-Service (SaaS) cloud storage provider that backs up customer account data. The security company that provides access control to company buildings and systems.
To achieve an efficient supply chain, organizations rely...
Blog
How To Prevent Ransomware
Fri, 06/02/2023
To prevent ransomware, companies need to focus on giving their employees actionable security awareness training that educates, empowers, and motivates. For this to happen, employees must understand the facts around ransomware and the profound, long-term impact it can have on the company.
Once a ransomware attack is successfully executed, there are very few options for the affected company apart...
Blog
Why Your Third-Party Vendors Have Almost Definitely Been Breached and What to Do About It
Mon, 04/17/2023
The news from Human Resources is that employees are happier than ever. Working from home using third-party vendor services makes work easier and more flexible.
The news from IT is less enthusiastic. A recent report showed that a whopping 98% of organizations have at least one third-party provider that has suffered a data breach in the last two years.
Third-party vendor relationships are nothing...
Blog
What You Need to Know About the Kaseya Ransomware Outbreak
Thu, 07/22/2021
In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients.
The Kaseya ransomware outbreak is one of the latest high-profile ransomware attacks targeting...
Blog
Examining The 2020 Healthcare Ransomware Surge
Fri, 11/06/2020
How to Protect Against Ryuk Ransomware
As countries worldwide struggle to come to grips with the Covid-19 pandemic, attackers have attempted to capitalize by launching a wave of ransomware attacks on hospitals across the U.S. and Canada. These attacks have taken place in locations ranging from New York, Nebraska, Ohio, Missouri, and Michigan, to Montreal, by using Ryuk ransomware.
But what is...
Video
Ransomware: Move from Beware to Be Aware!
Tue, 12/04/2018
DURATION: 40 MINUTES
Do you fear that your organization’s data will be kidnapped and held for ransom?
It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware risks.
Do you have a...
Blog
Scam by fraudsters – Ransomware
Wed, 07/10/2013
Ransomware is one the many scams that Internet users dread. Once this type of malicious program is installed, it asks the user for “ransom” to unlock the computer, using various pretexts and pretending to be a local police authority.
In one case, a user clicked on a malicious link and was bombarded with pornographic pop-ups. The user attempted to restart his computer, when he received a message...