Blogs — phishing
Categories
- 8 tips
- alberta
- audit
- becyberaware
- british columbia
- business
- Business awareness
- call center
- canada
- Canadian
- canadian business
- chat support
- checklist
- co-managed IT
- common phishing signs
- companies
- company
- company culture
- computer security
- customer support
- Cyber Security
- cyber security analyst
- cyber security companies
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
- cyber security engineer
- cyber security information
- cyber security news
- cyber security programs
- cyber security threats
- cybercrime
- Cybersecurity
- Cybersecurity defense
- cybersecurity training
- cyersecurity
- data breach
- device scam
- device security
- employee training
- fake emails
- freeupspace
- hackers
- health
- healthcare
- home security
- how to
- Indigenous Owned
- IoT
- kaseya
- kaseya attack
- malware
- managed service provider
- managedIT
- management
- manitoba
- medium size business
- MFA
- Microsoft
- MicrosoftDefender
- mobile
- mobile attacks
- morespace
- MSP
- multi-factor authentication
- new brunswick
- north west territories
- nova scotia
- nunuvut
- online
- online reputation
- ontario
- pei
- phishing
- phishing email
- phone breach
- phone hacked
- prince edward island
- quebec
- ransomware
- ransomware attack
- remote workers
- safe harbor
- Safe Harbour
- safe harbour informatics
- saskachewan
- scams
- sgn
- SLAM
- small business
- smishing
- storage
- two-factor
- typesofhackers
- USA Business
- vpn
- wifi
- windows
- windows10
- yukon
How Using the SLAM Method Can Improve Phishing Detection
Posted by Norma Stratton on
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email. Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve their methods as technology progresses. They use AI-based tactics to make targeted phishing more efficient, for example. If phishing didn’t continue working, then scammers would move on to another type of attack. But that...
Microsoft 365 Defender Can Shield Your Company From Phishing Scams
Posted by Norma Stratton on
Phishing can lose you a lot of money and expose sensitive information. Microsoft 365 Defender can dramatically mitigate this risk with several features. Phishing attacks are a severe threat to your business. These fraudulent actions can cause your team members to accidentally share financial, customer, and account information with cybercriminals. How does this happen? The issue is that the attackers seem credible since they’re impersonating trusted sources and high-level executives. As a result, your team members may not even have second thoughts about distributing sensitive personnel or corporate data. Despite the attempts to raise user awareness of this fraud, phishing...
- business ,
- Business awareness ,
- canada ,
- canadian business ,
- Cybersecurity ,
- Cybersecurity defense ,
- Microsoft ,
- MicrosoftDefender ,
- phishing ,
- safe harbor ,
- safe harbour informatics ,
- USA Business
Fake Call Center Tricks Users Into Installing Ransomware
Posted by Norma Stratton on
It has to be admitted, unfortunately, that scammers are quite good at their job. This is why new defenses are constantly being put in place as the scammers find new and improved ways to victimize individuals and businesses. Potential victims are becoming increasingly aware of steps they need to take to protect themselves. For example, many, if not most, understand the dangers of opening links in strange emails and will simply delete them on sight. What they may be less wary of are emails directing them to call and speak directly to what they are told is a company...
- Business awareness ,
- call center ,
- chat support ,
- customer support ,
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security information ,
- cyber security news ,
- cyber security programs ,
- cyber security threats ,
- email ,
- phishing ,
- phishing email ,
- ransomware ,
- ransomware attack