BLOG
Top-Clicked Phishing Email Subjects: Q2 2020
Phishing emails that look like they are coming from LinkedIn continue to be at the top of the list.
Should You Adopt a BYOD Policy?
BYOD policies have become quite popular in recent years. But, they are not always right for every organization. It’s important to consider the pros and cons, and decide if a BYOD policy makes sense for your business.
5 Common COVID-19 Cyber Attacks
Hackers are ruthlessly exploiting coronavirus fears with pandemic-related scams, phishing and malware campaigns.
Top-Clicked Phishing Email Subjects: Q1 2020
Last quarter, Coronavirus-related phishing email attacks were up 600%.
Securing Your Company Data in the COVID-19 World
Cybercriminals are using the current crisis to find new vulnerabilities in the IT infrastructure of businesses, large and small. Here are 5 actionable steps to help you secure your critical data during this unprecedented time.