Business Owners

10 articles
Tax Season Phishing: Peak Time for Big Game

Tax Season Phishing: Peak Time for Big Game

If you follow our Facebook and Twitter feeds then you’ve got a leg up—you know all about the growing phishing epidemic. Well-worded emails from supposed IRS workers or company execs have mislead many a dutiful employee. We’ve warned about this scamming method in the past, and the widespread threat continues to morph. The need for vigilance is vital. For while…
Data Privacy: It Does a Business Good

Data Privacy: It Does a Business Good

Respecting Privacy, Safeguarding Data and Enabling Trust. These tried-and-true tenets resurface every January 28th for the National Cyber Security Alliance’s (NCSA) annual Data Privacy Day (DPD), and 2017 was no exception. DPD’16 saw unprecedented media coverage and impressive levels of engagement online and via social media. Building on that success, the NCSA and its top-notch advisors encouraged even further involvement…
Tax Season Phishing: A Cautionary Tale

Tax Season Phishing: A Cautionary Tale

Joe, Kindly send me the individual 2016 W-2s (PDF) and earnings summaries for all of our company staff for a quick review. This request is time-sensitive and confidential. I really appreciate your cooperation. Thanks, Dave Smith Company CEO www.company.com Whether you’re often in communication with the upper execs at your company or not, the above request would sure get your…
Data Sharing and Privacy—It’s a Give and Take Thing

Data Sharing and Privacy—It’s a Give and Take Thing

We all generate a seemingly unending stream of data on a daily basis, much of which flows right into businesses’ info stores. It’s a given that as customers, we’ll have to give to get; we know that much. But what should be expected from the entities that house our personal details? Being Open to Privacy What’s potentially unsettling is that,…
Cyber Tug of War—Win, Lose, or Draw?

Cyber Tug of War—Win, Lose, or Draw?

The opposing forces of privacy and safety are at it again. This time, it’s Apple v. The Feds—heels in the mud, each hoping for victory. On the sidelines, fans make known their stake in the game. But in this tug of war, maybe the real win is when both sides keep their jerseys clean. Get Upfront and Personal Something for…

Zn Dy feature logowhaling attack: Not your momma’s attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company’s “big phish,” gaining insider access to company jewels. An offshoot of the well-known “phishing” attack, whaling is insidious and calculated deceit, with the end goal of exploiting business leaders’ personal devices. And unless execs know what to look for, they can easily be duped. This is no casual spam scam—attackers research correct titles, company information, even personal details in an effort to sound legit. Social media can play a huge part in the harvest, and along with being judicious in detail sharing, experts recommend quizzes and social pen-testing to expose vulnerabilities. Those in the know also predict that in the coming year, execs will need to be ever more vigilant if they hope to evade the hunters. Sounds like it’s time to drop anchor and chart a new course—toward protection.

Want more? Subscribe.

012716
Data Privacy Day 2016: <br>#PrivacyAware Is Where I.T.’s At

Data Privacy Day 2016:
#PrivacyAware Is Where I.T.’s At

In today's hyper-connected digital landscape, privacy is hard to come by. Really, that should make us value it all the more. And while in the business world this is especially true, that's just one piece of the ever-expanding cybersecurity puzzle. The National Cyber Security Alliance has long known that "Respecting Privacy, Safeguarding Data and Enabling Trust" is our collective responsibility—it's…
National Cyber Security Awareness Month 2015

National Cyber Security Awareness Month 2015

Another year has come and gone; those 365 days move faster than ever. Today’s rapid time movement is reminiscent of the constant advances in technology, and how those changes beget shifts in cyber awareness—it’s hard to keep up! ‘New’ is often synonymous with ‘vulnerable,’ and staying on top of the latest—be it news, updates, or training—can be a tall order.…
Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

For today's business, things have reached critical mass. Not only are we seeing data breaches at every turn, but we're also finding fractured camps at their root—'civil war' within an already raging 'cyber war.' If this sounds familiar, take heart—big problems, both real and perceived, can be worked through and neutralized. It comes down to communication, to going beyond department…
Offensive Cyber Defense

Offensive Cyber Defense

It's More than Just Crude Security As we round January’s corner into the new year, there’s so much to think about, from ambitious goals and adventurous plans, to lingering concerns. One thing’s for sure, with a slew of unprecedented data breaches, 2014 did what it could to keep cybersecurity on the brain. So whether it’s still taxing our nerves, or…