spear-phishing

Seriously?! Can You Not Do That? Chapter V - Careless/Misuse of Corporate Email

Every company uses e-mail to communicate, but few understand that this type of unstructured data needs to be protected. Considering that over 90% of attacks start with e-mail yet only 43% of IT professionals see projects involving unstructured data as a top priority, it’s not surprising that these attacks can cause significant financial damage. Here’s how companies can safeguard against this risk.

Your Organization's Greatest Threat? It's Bob.

You know Bob who works for your organization? That's right, Bob, the CFO. Nice guy. Organized, always on time, gets the job done. Good guy (except when he got tanked at the Christmas party but let's not talk about that). Well, there's something you might not know about Bob: He's incredibly dangerous to your business. 

Not 100% Sure It’s Grandma? It’s probably Phishing

Could you spot a phishing attack if and when it crosses your inbox? What about your colleagues? Your executive staff and mangers that hold the keys to the kingdom? Read on to explore the anatomy of a phishing email and how to avoid falling prey to these attacks.

Cybersecurity - Five Tips to Avoid Being "Harpooned” This Tax Season

Hackers are increasingly using social engineering scams to impersonate top executives and request transfers of funds or confidential employee information such as W-2 tax form information. Katherine Keefe, global head of BBR Services, offers 5 tips to help avoid being harpooned this tax season.