BLOG
Food Supply Chain Ripe for Cybercrime
The US Department of Justice has warned the food and agriculture sector to watch out for ransomware attacks aiming to disrupt supply chains.
Massive T-Mobile Data Breach: Safeguard Your Data Now
Wireless carrier, T-Mobile, has confirmed reports of a major data breach in which hackers obtained personal information belonging to more than 54 million past, present and potential customers.
5 Common Cybersecurity Myths
With all of the information out there about hacking, cyber breaches, software, and security awareness, there’s also a number of myths and misconceptions preventing organizations from making the right calls when it comes to safeguarding their technology.
Smishing: What Is It & How To Protect Yourself
At this point, you’re likely pretty familiar with the term ‘phishing’. But now, you keep hearing a similar new term, ‘smishing’. So what does it mean, and why is it so dangerous?
93% of LinkedIn Users' Data Scraped and Up for Sale Online
For the second time this year, data from 700 million LinkedIn users is up for sale online, potentially putting nearly 93% of their user base at risk of social engineering and spear phishing attacks.
Top-Clicked Phishing Email Subjects: Q2 2021
There has been a significant rise in phishing email attacks related to HR topics, especially those regarding new policies that would affect all employees throughout many types of organizations.
New Phishing Attacks Bypass Secure Email Gateways
An ongoing phishing operation that has stolen around 400,000 OWA and Office 365 credentials since December has now expanded to exploit new legitimate services in order to bypass secure email gateways (SEGs).
Top-Clicked Phishing Email Subjects: Q1 2021
Emails purporting to come from HR and security-related notifications are on the rise as employees return to the office.
How Your Supply Chain Can Impact Cybersecurity
Your supply chain can create a number of vulnerabilities in your network, so it’s important to not only focus on your own cybersecurity efforts, but to also be aware of the organizations you partner with and their security practices.
Two-Factor Authentication Isn't as Secure as You Think
Two-factor authentication raises the barrier to account access by requiring a secondary proof of identity, but it still has a number of weaknesses that can be exploited by cybercriminals.