irs-gift-card-phishing-email-scam

How a College Student Lost $10,000 to “The IRS”

Back when I worked in the division of student affairs, I came across an unsettling report from our university’s police department. One of my students (let’s call them ‘Jamie’) became a victim ...

DJ Sampath Chats about the COVID-19 Pandemic and Business Email Compromise

TechSpective Podcast Episode 048 Hello. It’s been a while. In my defense, time is just a construct and it seems to have mostly lost meaning–at least for me–during the COVID-19 pandemic quarantine ...
How to scan email headers for phishing and malicious content

How to scan email headers for phishing and malicious content

Introduction Phishing emails are one of the most common attack vectors used by cybercriminals. They can be used to deliver a malicious payload or steal user credentials from their target.... Go on ...

Episode 100 with Rachel Tobac and Kathleen Smith

In episode 100 of our May monthly show we discuss the history of the podcast, some of the most interesting cybersecurity and privacy news and events over the years, and speak with ...
Train, Test and Certify From Home!

Train, Test and Certify From Home!

The Covid-19 outbreak has left many people uncertain. Although some locations are beginning to lift a few of the social distancing restrictions, most public institutions remain under stay – at – home ...

Winning with Cyber Threat Intelligence: Taking a More Personal View

In this final article of our trilogy, we investigate how a cyber threat intelligence (CTI) analyst and associated programmes provide insight about physical and cyber threats to your organisation. The value of ...
Machine Learning Whitepaper

Growing Need Of Cybersecurity Professionals – An Statistical Analysis

The post Growing Need Of Cybersecurity Professionals – An Statistical Analysis appeared first on CCSI ...
COVID-19 cybersecurity

How COVID-19 Has Impacted Cybersecurity Teams

COVID-19 has impacted the work-life of millions, including cybersecurity professionals. Although good cybersecurity is built on anticipating threats and defending against what could happen, no one expected the total upheaval to everyday ...
Security Boulevard

Why OPSEC Is For Everyone, Not Just For People With Something To Hide – Part III

In this final part of the series, I discuss why everyone should consider reviewing their OPSEC (Operations Security), not just those with something to hide. If you haven’t read the previous articles ...

The Rising Threat of Business Email Compromise

State and city governments are in cybercriminal crosshairs because they tick a lot of boxes. Many government divisions have been dealt with the mandate of digital transformation, but this road to increased ...