Blockchain Technology: Can It Rise to the Cybersecurity Challenge?

Blockchain Technology: Can It Rise to the Cybersecurity Challenge?

Old-school cybersecurity approaches are having a hard time keeping up with the complexity and reach of the vast networks of interconnected machines that make up our reality. As the line blurs between the physical and digital worlds, companies large and small are struggling to keep data secure and private. But all hope is not lost. Security professionals are looking to blockchain technology as a way to meet cybersecurity challenges.

Read More

How to Proactively Identify and Report “Vishing” Attempts

How to Proactively Identify and Report “Vishing” Attempts

A reformed cyber-criminal who popularized the term “social engineering attack” famously pointed out that “it is far easier to trick someone into handing over, say, their password than to go to the trouble of hacking them.” This approach has taken hold in the cyber-crime world, with social engineering and phishing attacks—when an attacker poses as an authority figure via email or a website to trick a victim into divulging sensitive data—costing businesses $676 million in 2017, according to the FBI. Now an even simpler attack is gaining traction.

Read More

Don't Be Fooled by Padlocks and SSL Certificates

Don't Be Fooled by Padlocks and SSL Certificates

If you check for the green padlock symbol in your browser to ensure you’re accessing a safe and legitimate site, you’re not alone. According to a 2018 PhishLabs survey, more than 80% of those surveyed thought the green padlock in the address bar guaranteed the legitimacy/safety of a website. The reality is the padlock doesn’t mean the site is legitimate and it doesn’t mean you’re safe from hackers.

Read More

The Newest Type of Phishing Attack: Cloud-Based Documents

The Newest Type of Phishing Attack: Cloud-Based Documents

Phishing has become a well-known term, even showing up in prime-time commercials and rolling off the tongue of tech-savvy, scam-weary seniors. Despite the widespread awareness of phone, email, and even in-person phishing scams, new and creative attacks remain the bane of security staff. The latest phishing threat gaining traction? Cloud-based documents.

Read More

6 Common Ways to Compromise A Business Credit Card

6 Common Ways to Compromise A Business Credit Card

A recent report from Nielson predicts credit card fraud will result in more than $31 billion in losses by 2020. And, e-commerce fraud attacks increased by more than 30% from 2016 to 2017, according to credit reporting agency Experian. So how are attackers getting away with fraud and how can you protect your business credit cards?

Read More

5 Data Security Plan Requirements for Every Business Owner

5 Data Security Plan Requirements for Every Business Owner

Whether an organization hasn’t developed a data security plan out of a false sense of security or a lack of expertise, the results will be the same. A security breach will be debilitating. Every business owner, regardless of company size, should develop and implement a concrete data security plan.

Read More

Selling a Social Engineering Attack

Selling a Social Engineering Attack

Social engineering techniques are not only becoming more common but also more sophisticated. Attackers seem to be taking notes from Marketing 101, ensuring that their lures strike a chord with their victims with emails that include customized messages with very official looking logos and layouts, fraudulent phone calls that cite actual employee names and titles, and even well-rehearsed seemingly innocuous facility access attempts.

Read More

5 Big Data Breach Myths the Hackers Don't Want Exposed

5 Big Data Breach Myths the Hackers Don't Want Exposed

We all have sneaking suspicions about security, but as with all assumptions, some of these beliefs are actually myths. And they’re myths that hackers hope stay around as long as Nessie and Yetis. Separating reality from fairytale can help you keep your organization secure.

Read More

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

In our two previous posts on cyber resilience (CR)—how you manage operational risk and protect your assets—we explored how a holistic approach is best practice for a security-minded organization. Continuing to build on that knowledge foundation, this third part in the series explores risk management, external dependencies management, training and situational awareness.

Read More

Phishing Scam Subject Line Red Flags

Phishing Scam Subject Line Red Flags

Phishing scams are on the rise—and even more prevalent through the holiday season. One way to effectively combat these attacks is to recognize that suspicious emails start with suspicious subject lines. However, whether subject lines look suspicious depends on the awareness of the user ...

Read More