12 Days of Cybersecurity: Day 2

12 Days of Cybersecurity: Day 2

No matter how robust your internal cybersecurity strategy is, your vendors could be putting you at risk. Cyber attackers will always target the most vulnerable part of a supply chain to reach their intended victim. It’s important to perform due diligence on your...
Business Email Compromise Prevention

Business Email Compromise Prevention

Business Email Compromise (BEC) Imagine your CFO or Controller having a compromised email account. This could become a huge problem for your organization. The cyber criminal will work in the background to monitor the email box and watch the passing conversations. ...
Is Zoom Software Safe to Use?

Is Zoom Software Safe to Use?

The world is slowing down during this COVID-19 pandemic. We’re told to quarantine or self-isolate and not engage in groups. But there’s one group that’s not slowing down at all, cyber criminals. Cyber criminals and hackers will turn a global crisis into an opportunity...
The E-Skimming Outbreak

The E-Skimming Outbreak

Spam, ransomware, and malware continue to haunt organizations, but bad actors are always cooking up new spins on these tried-and-true methods. In the latest scheme of malware threats, e-skimming is growing at a rapid pace. E-skimming is a type of malware that infects...