Social Engineering and Healthcare

Social Engineering and Healthcare

Social engineering has become a larger threat to the healthcare industry in recent years. So much so that the Federal […] ...
The Social Engineering Code of Ethics

The Social Engineering Code of Ethics

Imagine you receive an email from your boss saying that there’s a new promotion at work. All you must do […] ...
Understanding threat actors

Understanding Threat Actors

A threat actor or “malicious actor” is defined as either a person or a group of people that take part […] ...
Defending Against Vishing: Is It Really Possible?

Defending Against Vishing: Is It Really Possible?

Vishing, a word that was entered into the Oxford Dictionary in 2015, defines what we call “voice phishing”. Using the […] ...
The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

When you are a vendor who provides a valuable service, you look for opportunities to help companies. Sometimes, a vendor’s […] ...
See Yourself In Cyber

See Yourself in Cyber

When you read this title maybe you think of yourself “I know nothing about computers.” Or, perhaps you think, “I’m […] ...
Vishing (Voice Phishing) in Social Engineering News

Vishing (Voice Phishing) in Social Engineering News

A new report by Mutare reveals costly and pervasive shortcomings in enterprise security protections against voice network attacks, such as […] ...
What is Vishing and Is It A Threat to Your Business?

What is Vishing and Is It A Threat to Your Business?

Vishing attacks can take many forms, but the hallmark of vishing is unsolicited telephone calls to your employees. Usually, these phone calls pretend to be from a legitimate organization that your company ...
The Deadly Risk of Cyber Attacks on Hospitals

The Deadly Risk of Cyber Attacks on Hospitals

During a routine visit to the doctor, he asked what I did for a living. I explained that my work […] ...
Stronger Security Posture

Stronger Security Posture: Building Your Program

In the first part of this two-part blog series, we touched on understanding your security posture, training your employees, and […] ...