Tag: Phishing

19
Oct

5 Must-Have Cybersecurity Measures Every Small Business Must Take

Written by: Jay H. Nowadays, cybersecurity measures are a must for individuals and organizations alike. Without them, cybercriminals can easily breach your network and steal, damage, or delete your invaluable data. If you think you are “too small” to be targeted by attackers, think again. Approximately 43 percent of all cyberattacks target small businesses, meaning you’re in the direct sight

Read more

11
Oct

You Can Now Go Passwordless With Your Microsoft Account

Written by: Jay H. Passwords have long been an inconvenient – but necessary – safeguard for everything in our online lives. We’re expected to use unique, complex passwords for every account or risk getting hacked. But now, Microsoft has announced that you can go passwordless with your Microsoft account. You can completely remove the password from your Microsoft account and instead

Read more

28
Aug

Phishing: Watch Out For Fake Unsubscribe Buttons

Written by: Jay H. Scammers are using fake unsubscribe emails to verify valid email accounts for use in future spam and phishing campaigns, according to BleepingComputer. You may have seen these in your inbox – emails with little to no context, simply asking if you wish to subscribe or unsubscribe. These emails do not describe what content you are subscribing

Read more

21
Aug

Report: 1-in-3 Employees Likely To Fall For Phishing Scams

Written by: Jay H. Phishing scams are incredibly lucrative for scammers, who manage to rob victims of billions each year. A new report from cybersecurity company KnowBe4 demonstrates just how effective these campaigns are, finding that one-in-three untrained users were likely to fall for phishing scams. Who’s taking the bait? KnowBe4 used what it calls a “phish-prone percentage” (PPP) to determine

Read more

2
Aug

Top Industries Targeted By Cyberattacks

Written by: Jay H. All organizations are at risk of cyberattacks, yet some industries are at greater risk. Cybercriminals set their sights on more vulnerable industries that either deal with highly sensitive data or lack the cybersecurity infrastructure of larger corporations. Today’s businesses cannot afford to remain complacent with their cybersecurity. After all, a single data breach costs organizations an

Read more

29
Jul

The Phishing Tactic Cybercriminals Are Using To Trick You

Written by: Jay H. Phishing campaigns are fraudulent attempts to gain sensitive information such as passwords, usernames, and credit card information from victims. These scam attempts are a lucrative business for cybercriminals and the most popular way to distribute malware. In fact, phishing attempts impacted 75 percent of organizations in 2020. Given this, businesses recognize the importance of security awareness training to

Read more

12
Jul

The Most Common Types Of Cyberattacks

  Written by: Jay H. A cyberattack is an attack on the information system of an organization or individual. Usually, cybercriminals leverage these attacks to exploit sensitive information or otherwise disrupt operations. Cyberattacks impact businesses every day. Indeed, cybercriminals attack every 39 seconds, underscoring how important good cybersecurity defence is for organizations. Here are the most common types of cyberattacks

Read more

22
Jun

Manufacturing Firms: The Biggest Ransomware Targets In 2021

Written by: Jay H. According to a new report from a Canadian international managed service provider, manufactured goods producers were the biggest ransomware targets in the first half of 2021. In the recent report issued by the Herjavec Group, 39 percent of victims listed on the data leak websites run by ransomware groups broadly fell into the manufactured goods category.

Read more

21
Jun

3 Ransomware Myths That Put Your Business At Risk

Written by: Jay H. If you’ve paid any attention to recent news, you’ve likely seen ransomware stories dominating major headlines. The Colonial Pipeline cyber attack is just one example of the devastation a cyberattack can cause. However, many small-medium business (SMB) owners still don’t consider themselves to be at risk despite the abundance of cyberattacks. Unfortunately, this couldn’t be further

Read more

18
Jun

4 Practices That Put Your Business At Risk Of Cloud Attacks

Written by: Jay H. According to the US Cybersecurity and Infrastructure Security Agency, weak cyber hygiene practices are responsible for a string of new successful cloud attacks. Despite having security measures such as multi-factor authentication (MFA), other bad practices allowed cybercriminals to conduct cloud attacks on organizations. The attackers used various methods, including phishing, brute force login attempts, and “pass-the-cookie”

Read more