Phishing on the Rise

Phishing on the Rise

For years, phishing has been one of the “go to” attack forms for hackers to gain access to your network systems. In fact, it’s been used since at least the early 90s, making it one of the oldest forms of hacks in use. But it appears this tactic is still in fashion....
The 12 biggest cloud security threats in 2018

The 12 biggest cloud security threats in 2018

The “cloud” has become a fixture in our society since it became mainstream in the early 2000s. Cloud computing can be used for nearly everything: backup and recovery (e.g. Dropbox), communication (Skype, WhatsApp), productivity (Microsoft Office 365, Google Docs),...
“Mailsploit” makes phishing attacks tougher to detect

“Mailsploit” makes phishing attacks tougher to detect

As if it weren’t already bad enough, phishing just got easier for the bad guys. A security researcher recently uncovered what is being dubbed “Mailsploit,” a variety of methods for making the identification of fake emails extremely difficult for the end user....

Current Cyber Threats and Market Update

Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare, higher education, and financial services. But all companies have email,...
Cyber Extortion is Real and Can Be Catastrophic

Cyber Extortion is Real and Can Be Catastrophic

Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing.  At risk in a digital extortion attack is not only a company’s reputation and data, but also its ability to function and even its very...