Weighing the Phish

Phishing attempts are getting better and better. The bad guys are now sending messages from hacked accounts which can lend credibility to the authenticity of the email.  If you are not expecting an email from sender, disregard the request or validate the request by reaching out to the sender via published contact information.  Remember: When in doubt, don’t act on it. It’s simply not worth it.With that said, let’s take a look at an actual p...

Phishing Off the Company Pier

Phishing attacks are rising at an alarming rate for companies across the globe. A respected cybersecurity company recently released the following statistics regarding this increase: • Email-based corporate credential phishing attacks quadrupled vs. the previous quarter. • 99% of the most highly targeted email addresses in the quarter didn’t rank as such in the previous report, which suggests attackers are constantly shifting targets....

Stay Educated – Stay Safe

As we regularly mention, you, the user, are the most important line of defense in protecting against cyber-attacks. Since user education is so critical in protecting businesses and individuals, the National Cyber Security Alliance created a website, https://staysafeonline.org, to arm users with the knowledge that they need to stay secure. We recommend that you visit this site periodically to stay abreast of the most current cybersecurity tip...

Phishing, Phishing, and More Phishing

According to a recent report, business email phishing attacks increased a whopping 476% year-over-year and credential phishing attempts quadrupled quarter-over-quarter. Even worse is that these attacks are having huge success and costing companies a lot of money. Companies will employ various electronic safeguards, but you are the most important line of defense, so THINK BEFORE YOU CLICK! Follow these tips to protect yourself and your company: ...

The Gift Card Scam – It’s the thought that counts.

A phishing scam involving gift cards is becoming more prevalent and is having surprising success. The scam works like this. The recipient will receive an email that purports to be from a “higher-up” in the company, requesting him to urgently purchase some gift cards (normally Apple or Google Play). After the cards are purchased, the scammer asks the victim to send him the codes off of the back of the card. Then the scammer goes shopping.Let’s take a l...

Two-Factor Authentication – Keeping Ahead of the Bad Guys

Most of us know someone or have heard of someone who has had an online account compromised. Whether this person had a Facebook account, an email account, or even a bank account hacked, the bad guys gained access by obtaining the password through a phishing attack or other means. And when they obtained access, mayhem ensued. These account hacks are becoming more and more commonplace, but there is an option that all of us should embrace where possib...

Phishing Attacks are on the Rise!

We repeatedly focus on phishing attacks because they are increasing and their success rate is improving … big time. Primarily, we are seeing success for Microsoft Office 365 phishing attacks where the scam aims to get the user to enter their Office 365 email address and password. Once the user falls for this scam, the bad guys take control of the email account and send emails in an attempt to steal money from the company, its vendors, or its cu...

Crisis of Identify (Theft)

The Internet is a fertile hunting ground for bad guys looking to poach the personal and financial data of their prey. The Internet has also made it easier for these criminals to sell or trade this stolen information, while making it more difficult for them to be apprehended. Review the following guidelines from the U.S. government to learn how to avoid being a victim and how to respond if you think you were victimized. How to Minimize Your Risk ...

Anatomy of a Phish

We spend a lot of time talking about phishing emails and with good reason. With every passing day, phishing attacks are becoming more sophisticated, and consequently, we have seen their success rates improve. With this said, let’s take a closer look at a few example emails which claim to be from Microsoft and target Office 365 users:     As always, remember that if you have the slightest doubt or hesitation about an email or requ

Don’t Be The Weak Link!

One might think that the biggest risk to an organization’s information security is its technology,  but in fact, the biggest risk is the actions or inactions of its employees.  Human error has become a major weakness today and is one that is easily exploited by cyber criminals. In actuality, one study showed that almost 90 percent of cyber-attacks are caused by human error or behavior. To ensure that you are not your organization’s weak link, please rev