Hook, line, and sinker—phishing scams are always in season. And anywhere you’d hunt for jobs can be under attack. With disasters rendering thousands jobless, the basic need for employment could turn to desperation. That low ebb of emotion provides ideal phishing conditions. So take note: when an ad claims guaranteed job…Read More
Technological advancement is a combination of benefits and drawbacks. Approximately 2 billion internet users today also use social networks—a figure that continues to soar. This surge of global connectivity supplies a prime playing field for those with ill intent. Every year, millions worldwide are ravaged by identity theft,…Read More
It knows your schedule, your Google login, and just sent a selfie, alerting that milk is low. Hmm—better stop on the way home. Don’t worry: it will probably remind you. Every second of every day, we’re up- and downloading, streaming and liking. At times, that’s whether we know it or not. And this is especially true in the up-and-coming…Read More
If you follow our Facebook and Twitter feeds then you’ve got a leg up—you know all about the growing phishing epidemic. Well-worded emails from supposed IRS workers or company execs have mislead many a dutiful employee. We’ve warned about…Read More
Kindly send me the individual 2016 W-2s (PDF) and earnings summaries for all of our company staff for a quick review. This request is time-sensitive and confidential. I really appreciate your cooperation.
We’re in the home stretch, and 2016 sure was one for the record books, cybersecurity- and other-wise. We’ll spare you a play-by-play, but suffice it to say in the world of all things cyber, we’ve hit a whole ‘nother level. And the upward trend continues, with abundant…Read More
wifi spoofing (AKA “evil twin”; “man-in-the-middle”): Just as fake as your favorite late show parody, but day and night when it comes to comic relief. A technique u…Read More
The opposing forces of privacy and safety are at it again. This time, it’s Apple v. The Feds—heels in the mud, each hoping for victory. On the sidelines, fans make known their stake in the game. But in this tug of war, maybe the real win is when both sides keep their jerseys clean. Somethin…Read More
pci compliance: Don’t let the snore-bore of a name fool you: PCI compliance standards could be your company’s lifeline, packing a solid punch in fighting cybercrime, protecting data security. A set of requirements designed to ensure that ALL companies that “process, store or transmit credit card information” are…Read More
One more 365, come and gone. Our hyperconnected lives keep us always on the lookout for the next update, the hottest feature, the latest trends for the new year. But then that's also just how we're wired. Yet while we love to leap ahead, a look back can be beneficial too—good, bad or average, it informs our journey forward, gives us a benchmark for…Read More
whaling attack: Not your momma's attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company's "big phish," gaining insider access to company…Read More
For today's business, things have reached critical mass. Not only are we seeing data breaches at every turn, but we're also finding fractured camps at their root—'civil war' within an already raging 'cyber war.' If this sounds familiar, take heart—big problems, both real and perceived, can be worked through and neutralized. It comes down to…Read More
Ironically versatile, this jargon-y noun/verb/adjective hurts both sides of the IT/C-suite aisle. Like its agricultural namesake, a corporate 'silo' siphons data top-to-bottom, squashing lateral, inter-departmental teamwork. The enemy of a communicative, goal-oriented culture, a 'silo mentality' starves efficiency and…Read More
As we round January’s corner into the new year, there’s so much to think about, from ambitious goals and adventurous plans, to lingering concerns. One thing’s for sure, with a slew of unprecedented data breaches, 2014 did what it could to keep cybersecurity on the brain. So whether it’s still taxing our nerves, or if we’re in transition,…Read More
Just as deadly as its cannibalistic sound-alike, infinitely sneakier. A compromised link in an infected chain of computers, a zombie loves to share the filth. Taking direction from a remote ‘bot master’ with an evil agenda, a group of zombies carry out malicious tasks undetected. Computer owners are often totally unaware as information…Read More
A logophile tongue-lashing? Wishful thinking. This "dictionary" is the cyber bully's tool. Using automation, hackers systematically try every entry as a password, hoping you chose "puppy" or "daisies"—or dare we say, "password"—to secure your sensitive data. Such an attack can also aim to find a decryption key, thereby rendering your…Read More
Heartbleed, BladeLogic, Backoff: These aren’t the names we remember. All too quickly we forget the lurking threat of malware and its perpetrators, while their victims’ names linger in our collective consciousness. We remember the scandal, but forget the warning. Technologies are evolving exponentially, with hackers riding the wave of progress toward…Read More
The cyber equivalent of your standard nature documentary scene, this shady strategy uses employees’ browsing habits against them, infecting oft-visited sites—like the local pizza joint you order lunch from every Friday—with malware. When an unsuspecting user visits this familiar site, his computer becomes infected,…Read More
Connection established. Brace yourself for good times!
Uh oh! Please check your entry and try again.