Business travelers tend to check email and update spreadsheets on the road – sometimes from the comfort of an economy seat on an airplane. But did you know this can raise the risk of a data breach at your company?
Stay safe with these seven tips for data security on business trips. Share them with your clients to show them that you’re an expert.Continue reading
Verizon released its 2016 Data Breach Investigations Report, and along with it some astonishing facts about the prevalence and success of phishing attacks.
See why you shouldn’t be deceived by the simple nature of phishing emails and how they can worm their way into your company’s data.Continue reading
Mobile phones are everywhere, and they hold a growing amount of our lives and work. But are they safe for the office? Is mobile malware a real threat?
See the top four myths about mobile malware and what they mean for your security. Find out how fast the problem is growing and how to keep your phone safe.Continue reading
Need a few examples of small businesses hit by cyber attacks? This article has three examples to show how a simple phishing email or malware infection can bring huge losses.
Also: did you know that banks are not required to repay funds stolen from a business account? You’ll see why in this article. Show your clients to make sure they realize: once a hacker has their money, it’s gone.Continue reading
Criminals are placing ads on some of the most popular sites on the web. The scariest part: the ads can infect users with malware without even clicking.
Learn more about the rapidly growing threat called “malvertising.” Find out how attackers are combining zero-day exploits, malware, and online ads for a powerful attack strategy, and see how you can avoid it.Continue reading
Wire fraud is the modern-day bank heist. Instead of masks and guns, thieves use stolen email credentials and clever deception to snatch thousands of dollars. How do these heists begin? With stolen data.
Get a quick overview of wire fraud tactics so you can protect your business and your clients. See how thieves steal the data, fool the banks, and make off with the money.Continue reading
Chances are you can name four or five types of network attacks – but which are the most common? And which are you most likely to see on one of your networks?
In this post, we show the top 7 types of network attacks worldwide during the first quarter of 2015. You’ll see the list and description for each type.Continue reading
The average cost of a cyber attack on a small business is more than $20,000 – and that’s just the average. Since the number of breaches shows no sign of slowing, it might be the right time to consider a cyber insurance policy for your business.
Find out if cyber insurance is right for your company in this post. We’ll show you what a cyber policy typically covers, and you’ll get tips for finding the right policy in the market.Continue reading
Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.Continue reading