Business Email Compromise Prevention

Business Email Compromise Prevention

Business Email Compromise (BEC) Imagine your CFO or Controller having a compromised email account. This could become a huge problem for your organization. The cyber criminal will work in the background to monitor the email box and watch the passing conversations. ...
Is Zoom Software Safe to Use?

Is Zoom Software Safe to Use?

The world is slowing down during this COVID-19 pandemic. We’re told to quarantine or self-isolate and not engage in groups. But there’s one group that’s not slowing down at all, cyber criminals. Cyber criminals and hackers will turn a global crisis into an opportunity...
The E-Skimming Outbreak

The E-Skimming Outbreak

Spam, ransomware, and malware continue to haunt organizations, but bad actors are always cooking up new spins on these tried-and-true methods. In the latest scheme of malware threats, e-skimming is growing at a rapid pace. E-skimming is a type of malware that infects...
Iran Cyber Attack Warning

Iran Cyber Attack Warning

Rising tensions between the United States and Iran could inspire Iran to launch cyber attacks against U.S. infrastructure. Following the January 2, 2020 U.S. strike in Iraq that killed Iranian IRGC-Quds Force commander Qassem Soleimani, the U.S. Department of Homeland...
Municipality Ransomware

Municipality Ransomware

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not,...