BLOG
How To Safely Use Public WiFi
A public WiFi network is inherently less secure than your own, private one, because you don't know who set it up, or who else is connecting to it. Here are the do’s and don’ts of using public wifi to mitigate your hacking risk.
Food Supply Chain Ripe for Cybercrime
The US Department of Justice has warned the food and agriculture sector to watch out for ransomware attacks aiming to disrupt supply chains.
Massive T-Mobile Data Breach: Safeguard Your Data Now
Wireless carrier, T-Mobile, has confirmed reports of a major data breach in which hackers obtained personal information belonging to more than 54 million past, present and potential customers.
5 Common Cybersecurity Myths
With all of the information out there about hacking, cyber breaches, software, and security awareness, there’s also a number of myths and misconceptions preventing organizations from making the right calls when it comes to safeguarding their technology.
Smishing: What Is It & How To Protect Yourself
At this point, you’re likely pretty familiar with the term ‘phishing’. But now, you keep hearing a similar new term, ‘smishing’. So what does it mean, and why is it so dangerous?
5 Signs It's Time to Upgrade Your Outdated IT Infrastructure
You’ve likely heard the old adage “If it ain’t broke, don’t fix it”. While that can be true about some things, following this advice when it comes to IT infrastructure can be a dangerous, and costly, mistake.
93% of LinkedIn Users' Data Scraped and Up for Sale Online
For the second time this year, data from 700 million LinkedIn users is up for sale online, potentially putting nearly 93% of their user base at risk of social engineering and spear phishing attacks.
Top-Clicked Phishing Email Subjects: Q2 2021
There has been a significant rise in phishing email attacks related to HR topics, especially those regarding new policies that would affect all employees throughout many types of organizations.
What's That Term?: Ransomware
Ransomware is an ever-evolving form of malware designed to hold a victim’s data for ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.
New Phishing Attacks Bypass Secure Email Gateways
An ongoing phishing operation that has stolen around 400,000 OWA and Office 365 credentials since December has now expanded to exploit new legitimate services in order to bypass secure email gateways (SEGs).