Blogs — Cybersecurity

Categories

How Using the SLAM Method Can Improve Phishing Detection

Posted by Norma Stratton on

How Using the SLAM Method Can Improve Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email. Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve their methods as technology progresses. They use AI-based tactics to make targeted phishing more efficient, for example. If phishing didn’t continue working, then scammers would move on to another type of attack. But that...

Read more →

Why You Should Put IoT Devices on a Guest Wi-Fi Network

Posted by Norma Stratton on

Why You Should Put IoT Devices on a Guest Wi-Fi Network

The number of internet-connected devices in homes has been growing. It's increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT devices. IoT stands for Internet of Things. It means any other type of “smart device” that connects online. IoT devices in a home can be everything from your streaming stick to your smart refrigerator. Smart baby monitors and Alexa voice assistants are also IoT. There's also been another change that has happened over the last...

Read more →

Learn What Smishing Texting Scams to Expect

Posted by Norma Stratton on

Learn What Smishing Texting Scams to Expect

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts for shipment tracking and sale notices. The medical industry has also joined the trend. Pharmacies send automated refill notices and doctor’s offices send SMS appointment reminders. These kinds of texts can be convenient. But retail stores and medical practices aren’t the only ones grabbing your attention by text. Cybercriminal groups are also using...

Read more →

Explaining Cybersecurity Audits & Three Tips

Posted by Norma Stratton on

Explaining Cybersecurity Audits (And the Three Tips for Running One)

You need more than the latest antivirus software to ensure your company’s network is secure. A cybersecurity audit helps you create a complete picture of your security strategy. Cybercrime has grown into one of the epidemics of modern times.  In 2018 alone, we saw 812.67 million instances of malware infection. Meanwhile, 2020 brought with it a 600% increase in cybercrime. And estimates state that ransomware attacks will cost companies over $6 trillion per year by 2021. If you don’t prioritize cybersecurity, you place yourself and your company at risk of attack. Now, it’s likely that you already have some strategies...

Read more →

5 Key Questions C-Suite Needs to Ask About Cybersecurity

Posted by Norma Stratton on

5 Keys Every C-Suite Needs to know About Cybersecurity

With the advancement of technology, cyber threats are becoming more sophisticated and intricate. Organizations of all sizes face the risk of cyberattacks, necessitating the attention and participation of executive-level managers (C-Suite or even those serving on boards of directors). To help C-level executives understand their risks and prepare for cyberattacks, here are 5 key questions that the C-Suite can use to get a better understanding of cybersecurity best practices. 1. Why should I be concerned about data security? The threat of cybercrime is very real. Any internet-based system or service is at risk. Approximately every 39 seconds, a computer or...

Read more →