email scams

We Are All A Cyber Fraud Target. 5 Tips To Help You To Be Cyber Secure.

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

Looking for a new job? Then the scammers want you!

If you're a big company and you're not looking for imposters, you're making a big mistake. If you, as an individual, get a job offer emailed to you out of the blue apparently from a big company, it's pretty much a certainty you're going to loose out big time if you get "employed." Read Mark Gibbs' latest Gearhead column to learn why.

Not 100% Sure It’s Grandma? It’s probably Phishing

Could you spot a phishing attack if and when it crosses your inbox? What about your colleagues? Your executive staff and mangers that hold the keys to the kingdom? Read on to explore the anatomy of a phishing email and how to avoid falling prey to these attacks.

Seriously?! Can You Not Do That? | Prologue

Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.

The 5 Best Defenses Against Ransomware Are Aggressive Offenses

The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.

Data Breaches Happen to SMBs Too. Often Because of Human Error

Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.

Abracadabra! Hocus Pocus! I Was Spoofed Once, Never Again

Even an Info Security professional can fall victim to a prevalent hacker ploy: spoofing, as Alphonzo Albright learned. Luckily he caught it before damage had occurred. Here are tips how you can protect yourself from such a scam.

Who Are You to Ask Me Who I Am? Two Party Authentication is a Must

Ever get that feeling where the person on the other end of the incoming phone isn't who they claim to be? What about that time you needed to contact your bank so you click the link in the email to find the bank's number - ever wonder if it's a legitimate number? Maybe you should think twice. Twice authenticated, that is.

Curiosity Killed the Cat and Other Cybersecurity Horror Stories

When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.