cybercrime

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

You almost became the next Equifax. Did you even know? (Part 1 of 2)

While Equifax made global headlines with their cyber breach, IBM’s research has shown that small and mid-sized businesses (SMBs) are the targets of 62% of all cyber attacks. That equates to 4,000 SMBs daily¹ – or in more context, nearly 1 in 4 (24.33%) of U.S. SMBs (excluding nonemployers) annually. While an attack on your organization may not create global headlines, the impact to your organization and its’ employees could be devastating. If it extends to your customers’ information and records, it could negatively impact them and shatter your reputation. How devestating? I’ll share a real-world example. […]

Game-Changing Technologies, Part II: Get Ready to Forget Your Passwords. Forever.

We human beings are creatures of habit. Because something was a certain way yesterday, we expect it to be the same way today and tomorrow. But if you’re like most of us, technological changes in recent years have led you to rethink assumptions as familiar routines have fallen by the wayside: When was the last time you licked a stamp, used a payphone, or wrote a check at the supermarket? In my last blog post, I wrote in general about game-changing technologies that would radically transform the way we work with technology and conduct business. In this post and in weeks to come, I’ll provide some specific examples, beginning with another technological relic we can all say goodbye to soon: [...]

2018-09-28T09:41:44+00:00By |cyber, cybercrime, IT|