How to Handle Suspicious Emails and Phishing Attacks

How to Handle Suspicious Emails and Phishing Attacks

| | Industry Insights
Suspicious emails are one of the oldest cybersecurity risks around, yet the 2021 Verizon Data Breach Investigations Report notes that phishing attacks account for more than one-third (36%) of all data breaches — a fraction which has actually risen in the past years. It’s undoubtedly true that people are generally ... Read More
How to Handle Suspicious Emails & Phishing Attacks

How to Handle Suspicious Emails & Phishing Attacks

| | Industry Insights
Suspicious emails are one of the oldest cybersecurity risks around, yet the 2021 Verizon Data Breach Investigations Report notes that phishing attacks account for more than one-third (36%) of all data breaches — a fraction which has actually risen in the past years. It’s undoubtedly true that people are generally ... Read More
Insider Risk: Keep Your Business Soaring

Insider Risk: Keep Your Business Soaring

| | Industry Insights
“So you’ve checked the plane, right?”“Yup.”“You’ve made all 173 checks?”“Er…Uh… Is that a bird over there or a…? Oh, never mind—it’s gone.” You’re deflecting — the truth is you got bored somewhere around check #90. But everything will be fine, right? It always is. “Ok, let’s go!” The pilot starts ... Read More
Insider Risk: Keep Your Business Soaring

Insider Risk: Keep Your Business Soaring

| | Industry Insights
“So you’ve checked the plane, right?”“Yup.”“You’ve made all 173 checks?”“Er…Uh… Is that a bird over there or a…? Oh, never mind—it’s gone.” You’re deflecting — the truth is you got bored somewhere around check #90. But everything will be fine, right? It always is. “Ok, let’s go!” The pilot starts ... Read More