Graphic: CCPA vs GDPR

CCPA vs GDPR: What You Need to Know About These Data Privacy Laws

These two far-reaching pieces of legislation are confusing — we’ll provide a bit of clarity about how they affect your organization Looking at the information security and data privacy industries... The post ...
Payroll Fraud: A Growing BEC Threat to Businesses and Employees Alike

Payroll Fraud: A Growing BEC Threat to Businesses and Employees Alike

The FBI reports that direct deposit change requests increased more than 815% in 1.5 years $8.3 million. This number represents the total reported losses due to payroll diversion schemes that... The post ...
Graphic: Gavel representing New York SHIELD Law

New York SHIELD Act: The Latest Amendment to NY State’s Cybersecurity Law

New York is updating their cybersecurity laws — here’s how these changes impact your business (even if you’re not in NY) The New York SHIELD Act. It sounds like it... The post ...
DDoS attack traffic jam

What Is a DDoS Attack? (Hint: It Involves Zombies & Traffic Jams)

A distributed denial of service (DDoS) attack is kind of like a traffic jam on a website What is a DDoS attack and what does it mean for your website?... The post ...
Cybersecurity Awareness Month 2019 & The Three Little Pigs

Cybersecurity Awareness Month 2019 & The Three Little Pigs

October is National Cybersecurity Awareness Month. This year let’s have some fun while spreading cybersecurity awareness! Since 2003, October has been National Cyber Security Awareness Month in the US (and... The post ...

Cyber Risk Management: 2019 Insights from Microsoft, Marsh, & Deloitte

| | Hashing Out Cyber Security
A look into the perceptions and attitudes of businesses concerning cyber security risks Cyber risk management, or what’s sometimes called cyber security risk management, has been identified as a growing... The post ...
Reconstruction of actual vishing call to a small business - Harwood Estates

What is Vishing? How to Recognize Voice Phishing Phone Calls

Nearly half of infosec professionals reported experiencing vishing or smishing in 2018 Vishing. Phishing. Smishing. These terms sound like something a child made up and then decided to make the... The post ...
Top motivators for successful phishing emails

What is Phishing? A Look at One of Cybercrime’s Favorite Tactics

An in-depth look at the types of attacks that are involved in 32% of all data breaches In our news-heavy world, there isn’t a lot that surprises us anymore. But... The post ...
These go to 11.mpg

Bitcoin Phishing: The n1ghtm4r3 Emails

The story of how a scumbag named n1ghtm4r3 polluted our inbox with Bitcoin Phishing emails. Let’s have a little fun today and talk about some Bitcoin phishing emails that have... The post ...
20 Surprising IoT Statistics You Don’t Already Know

20 Surprising IoT Statistics You Don’t Already Know

The IoT device market is on the rise and is poised to reach $1.1 trillion by 2026 The Internet of Things (IoT) has been a hot topic for decades —... The post ...
Loading...