phishing threats

C-Level Security Compliance – The Need for Communication and Automation

While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity…

1 year ago

How URL Filtering Fails Users (and What You Should Do)

URL filtering is a feature of most Next-Generation Firewalls (NGFW) and some Web Proxies. […]

1 year ago

8 ‘Must-Haves’ that Today’s Security Policies Need to Include

As we’ve blogged about previously, the security response to phishing attacks and other cybersecurity […]

1 year ago

7 Sophisticated Cyber-Attacks that are Growing in 2019

Shadow IT and the growth in applications at use in the work environment, together […]

1 year ago

4 Infamous Social Engineering Attacks That Real-Time Protection Would Have Stopped

Threat actors are constantly evolving their methods to go after the human attack surface […]

1 year ago

Phishing C2 Callbacks – Your Organization Has Likely Already Been Compromised

Callbacks to command-and-control (C2) servers can be indicators of an early stage breach, or […]

1 year ago

Why Organizations Need to Take Phishing Threats Against Their Employees Seriously

There are still some businesses out there who believe that phishing attacks on their […]

1 year ago

A Phishing Protection Protocol that Covers 6 Non-Email Attack Vectors

The evolution of phishing attacks over the past couple of years has shown a […]

1 year ago

Protecting Against Rising Phishing Attacks and the Human Element

We often say that when it comes to protecting an organization from cybersecurity threats, […] The post Protecting Against Rising…

1 year ago

Reports Indicate We The North Are Also We The Phished

As a company with offices in Northern California it should come as no surprise […] The post Reports Indicate We…

2 years ago