We’ve just released a free resource for recognizing phishing scams called “Recognizing the Danger in Your Inbox.” It’s an interactive, web-based mini training course that takes only four (4) minutes… Read more Free Resource for Phishing Awareness →
Our latest round of Cyber Roundups is out, and it contains one of my favorite BEC (Business E-mail Compromise) stories to date. BEC, a form of spear phishing, often impersonates… Read more When Procedures Aren’t Followed →
It seems like everything security-related begins with “Yes, but…” or “It depends” these days. (No wonder users are frustrated.) Because of security problems surrounding credentials (data breaches, phishing attacks, and… Read more Not all 2FA is Created Equal →
When providing education on phishing, we tell employees to delete e-mails with attachments from unknown sources because of the potential for malware to infiltrate your network. However, there may be some cases where this would negatively impact business. Let’s look at a scenario where e-mails with attachments from unknown senders are a normal part of business operations. Perhaps you’re responsible for hiring and ask people to e-mail their resumes to you. Or, because you’re a hiring manager or in HR, people send you resumes out of the blue. How do… Read more But… I expect e-mails from new people all the time. →