How to Stop Social Engineering in its Tracks

How to Stop Social Engineering in its Tracks

Social Engineering [NOUN] – in the context of information security, it is the use of deception to manipulate people into divulging confidential or personal information that could be used for fraudulent purposes.

“Today, social engineering is one of the greatest security threats facing organizations" ¹. When successful, attackers gain legitimate access to information, making it hard to spot (or stop) before it’s too late.

Beware of sneaky Microsoft Office malware…

Beware of sneaky Microsoft Office malware…

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cyber-criminals have discovered a new attack method using Microsoft Office.

IoT Security Awareness: IoT Devices and Security Recommendations For Your Office

IoT Security Awareness: IoT Devices and Security Recommendations For Your Office

Manufacturers and consumers alike continue to embrace the efficiency and personalized service of the multitude of network connected devices known collectively as the Internet of Things or IoT. Connected devices are now performing processes which were immune from malicious cyber activity because they were accomplished manually.

What is NIST Compliance? The NIST Cyber Security Framework Explained

What is NIST Compliance? The NIST Cyber Security Framework Explained

New cyber security requirements for federal and nonfederal agencies. Here we take a moment to clarify some things.

If you know what the NIST Cyber Security Framework is, or have at least heard the term pop up, it might affect your organization. Keep reading this post to learn more about NIST and the Cybersecurity Framework.

VoIP Phishing: This is How Scammers do it

VoIP Phishing: This is How Scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

What is Cyber Liability Insurance?

What is Cyber Liability Insurance?

Cyber Liability addresses the first and third party risks associated with e-commerce businesses, the Internet, networks and informational assets. Cyber Liability Insurance offers coverage protection for exposures arising out of Internet communications.

The History of Hacking: Are all hackers out to do harm?

The History of Hacking: Are all hackers out to do harm?

The days of  home-organized hacking led by thrill-seeking teenagers are gone. Learn how hackers are changing the world. Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple.

The Top 6 Reasons Small Businesses Outsource Cybersecurity

The Top 6 Reasons Small Businesses Outsource Cybersecurity

Outsource cybersecurity: Small businesses are working smarter by managing their network security through a service provider.

A chaotic 2017 has seen several cybersecurity meltdowns, so far. If you'd like to get caught up, read "The Biggest Cybersecurity Disasters of 2017 So Far" There is an epidemic taking place in the world of technology today.

Checklist – Know These Types of Malware to Stay Protected

Checklist – Know These Types of Malware to Stay Protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.