Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.
See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.Continue reading
Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.
See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.Continue reading
Russian cyber gangs, Chinese state actors, the hacker group Anonymous – who is the main source of security incidents? The answer might surprise you.
See the top five actors behind security incidents in the retail and consumer industries. You’ll get stats and analysis with a description of each source.Continue reading
There is no denying it: cloud services are popular. But even if you feel that they are the best fit for your company, you should know that they do not come without risk.
See the top five risks of cloud computing, and see how sending your tasks to the sky might impact your data security, availability, and compliance.Continue reading
Wait, there's more! Check out the second half of our predictions for cyber security trends in 2016.
See what we expect will happen in healthcare, regulation, DDoS attacks, and more.Continue reading
2016 is here and we have a full year of cyber security news and trends ahead of us.
But what happened last year? And what does it mean for 2016? Read on to find out.Continue reading
Romance scams, business email fraud, and scams targeting the elderly, were all popular last year, according to the annual report of the FBI Internet Crime Compliant Center.
In this post, we highlight four trends shown in the FBI’s data. You’ll see that social media scams increased 400%, and who is most at risk for romance scams and business email compromises.Continue reading
Everything was great. You were in compliance with PCI DSS. You were the belle of the ball. Everyone was in awe of your team. Then it was midnight -- and your compliance vanished.
Or did it? When the clock strikes 12:00 on June 30, PCI will have five new rules as its ‘best practice guidelines’ become requirements. Will you still be in compliance?
In this post, you’ll see the five new rules so you can have them covered.Continue reading
Chances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.Continue reading