How to Prevent BEC with Vendor Payment Integration

Business email compromise (BEC) is a form of fraud that targets businesses in all industries. One of the main goals, of course, is getting at the money. To accomplish this task, fraudsters sometimes... Go on to the site to read the full article ... Read More

4 Ways to Integrate BEC Prevention Strategies into Your Organization

Business email compromise (BEC), an international fraud scheme, is seemingly forever on the rise and no company is safe from attack. It’s therefore essential that your organization has good methods... Go on to the site to read the full article ... Read More
Top 5 Security Apps for Android Users

Top 5 Security Apps for Android Users

Your smartphone is even more valuable than your wallet. If stolen or compromised, its contents can be used against you; if there is work-related information on there, it can also damage your job.... Go on to the site to read the full article ... Read More
How to Break Into the Field of Security Risk Management

How to Break Into the Field of Security Risk Management

A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the way and keep your company secure. What is... Go on to the site to read the full article ... Read More
The Top 10 Data Breaches of 2017

The Top 10 Data Breaches of 2017

Introduction As we begin a new year, let’s take a moment to look back on the biggest data breaches in 2018. This is a year-end list no one is excited to be on, yet it’s an important reminder of how... Go on to the site to read the full article ... Read More
Top 5 Security Apps for iPhone Users

Top 5 Security Apps for iPhone Users

Your iPhone is literally your life. If stolen or hacked, your photos, messages, credit cards, and other personal information can be used for malicious purposes. Therefore, it’s in your best interest... Go on to the site to read the full article ... Read More
5 Easy Ways to Protect Your Small Business from Phishing Attacks

5 Easy Ways to Protect Your Small Business from Phishing Attacks

Your business is vulnerable to phishing attacks, no matter what size it is. According to the 2016 State of SMB Security Report, half of the 28 million small businesses in the US have been breached;... Go on to the site to read the full article ... Read More
Anti-Phishing: Email Client Security Features

Anti-Phishing: Email Client Security Features

Introduction An employee’s email is an indispensable feature of the workplace but also a company’s greatest weakness. It is estimated that more than 90% of phishing attacks begin with an email, so... Go on to the site to read the full article ... Read More
Computer Forensics: Digital Forensics

Computer Forensics: Digital Forensics

Introduction Digital forensics is the science of preserving and analyzing digital data; this data can then be used in court cases as well as for crime detection and prevention. Digital forensics... Go on to the site to read the full article ... Read More
Role Based Security Awareness Training: Training Those Who Don’t Think They Need It

Role Based Security Awareness Training: Training Those Who Don’t Think They Need It

Introduction Security awareness training is essential for every person that has an email account and/or access to your company network. This can include everyone from the CEO to the receptionist;... Go on to the site to read the full article ... Read More
Loading...