As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.
If you're a big company and you're not looking for imposters, you're making a big mistake. If you, as an individual, get a job offer emailed to you out of the blue apparently from a big company, it's pretty much a certainty you're going to loose out big time if you get "employed." Read Mark Gibbs' latest Gearhead column to learn why.
Could you spot a phishing attack if and when it crosses your inbox? What about your colleagues? Your executive staff and mangers that hold the keys to the kingdom? Read on to explore the anatomy of a phishing email and how to avoid falling prey to these attacks.
Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.
The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.
Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.
Even an Info Security professional can fall victim to a prevalent hacker ploy: spoofing, as Alphonzo Albright learned. Luckily he caught it before damage had occurred. Here are tips how you can protect yourself from such a scam.
Ever get that feeling where the person on the other end of the incoming phone isn't who they claim to be? What about that time you needed to contact your bank so you click the link in the email to find the bank's number - ever wonder if it's a legitimate number? Maybe you should think twice. Twice authenticated, that is.
When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.