Business Email Compromise (BEC)…sounds like something you might learn about in business school. Sounds almost boring. However, in reality, it is one of the main sources of online fraud, even topping ransomware.
Ransomware: The Growing Threat and How to Fight Back
Ransomware attackers are becoming more sophisticated and finding ways to bypass existing defenses. Here are some effective protection strategies for your organization.
Are you a target for spear phishing? Learn how to protect yourself.
Are you a target for spear phishing? If you are a mid to senior-level manager in on organization, then chances are that you are. It is worth noting that over 70% of the recipients of the “Be Cyber Safe Newsletter” are individuals in positions of authority, such as elected officials, senior managers, directors, or middle-level managers, who are the primary targets of spear phishing attacks.
Think twice before scanning a QR code.
Encountering a QR code is unavoidable in our daily lives. Whether shopping, dining out, or watching TV, we frequently come across these perplexing collections of black-and-white checkerboards that can pose a significant threat if not handled properly. QR codes have quickly established a reputation for being a fast and convenient way of obtaining information or […]
The Deep Web makes up 90% of the Internet.
Wait, what? Isn’t the Deep Web the illegal marketplace teeming with drug dealers, thieves, and hitmen?
No, that’s the “Dark Web.”
What is the Deep Web?
How to Boost Your Cyber Security in Three Steps
Despite billions in losses annually in the US alone, a lot of organizations do not provide any organized cyber security training to their employees. Take control of your safety by following these simple three steps to improve your security awareness.