“It will never happen to us.” Famous last words! When it comes to phishing, a line like this may fall loosely from an IT executive’s lips.
Data breaches are becoming a relatively common occurrence for businesses of all sizes around the world — for companies in the United States in particular.
Companies spend millions of dollars every year on IT security solutions such as firewalls, antiviruses, anti-spyware/malware, and email protection software.
In May 2018, a groundbreaking regulation went into effect that changed how data is collected, processed, stored, and used by businesses, governments, and organizations around the world.
In our data-driven world, email privacy issues and data security are hot-button topics for legislators, consumers, and companies alike.
In a time when people are used to waiving their right to privacy in exchange for access to exclusive services, users have become conditioned to believe that their privacy is a secondary concern to security.
Think of your employee email platform as an ancient fortress that is surrounded by a deep moat filled with water and hungry crocodiles.
As cyber security companies work to step up their game to prevent cyber attacks and data breaches, hackers also continue to adapt their strategies, seeking new and innovative ways to scam victims out of thousands or millions of dollars. One way they do this is by using spear phishing attacks.
There is a classic horror movie trope where a babysitter is being prank called.
For hackers, business email compromise (BEC) is the holy grail of phishing.
The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts to ultimately gain access to the control infrastructure that monitors and controls the flow of electricity in the US power grid.