In July of this year, the SEC approved new cybersecurity disclosure rules for public companies, titled “Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies.” The regulations require companies that are subject to...
For years, phishing has been one of the “go to” attack forms for hackers to gain access to your network systems. In fact, it’s been used since at least the early 90s, making it one of the oldest forms of hacks in use. But it appears this tactic is still in fashion....
The “cloud” has become a fixture in our society since it became mainstream in the early 2000s. Cloud computing can be used for nearly everything: backup and recovery (e.g. Dropbox), communication (Skype, WhatsApp), productivity (Microsoft Office 365, Google Docs),...
As if it weren’t already bad enough, phishing just got easier for the bad guys. A security researcher recently uncovered what is being dubbed “Mailsploit,” a variety of methods for making the identification of fake emails extremely difficult for the end user....
Voice assistants – just like dolphins – can hear high frequencies that humans can’t hear. And a team of security researchers from Zhejiang University recently found that this ability to hear inaudible sounds (frequencies above 20KhZ) provide cybercriminals the...
Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare, higher education, and financial services. But all companies have email,...