Posts

Fake LinkedIn Emails are some of the Most Clicked

KnowBe4 releases a new report each quarter detailing the latest top-clicked phishing email subjects based on results from their simulated phishing tests. Their Q3 2020 Report was released in October, and they shared that LinkedIn took up a whopping 47% of the most-clicked social media email subjects.

Critical Security Bug for WordPress Plugin

On Monday, Wordfence shared that a plugin called Ultimate Member, which is installed on more than 100,000 sites, has several critical security flaws that allow attackers to take over a site.

Be Extra Cautious of Phishing and Cyber Attacks as We Approach Election Day

As we continue to creep closer and closer to election day, cybercriminals are more determined than ever to target US residents. They know that the election is the hottest topic right now, and people might be more susceptible to falling victim to phishing attacks, especially if they focus on anything remotely related to the election.

4 Ways to Better Protect your Company from Cyber-Criminals

How do you protect your end users in the office? What about those at home? How do you make sure your data is not compromised? How can you be confident that you are doing everything possible to keep your company secure? We are going to share four ways that you can protect your company – and feel confident that you are protected!

Paying Ransom to Unlock Data is Now Illegal

In an advisory released on October 1st, the US Department of the Treasury's Office of Foreign Assets Control (OFAC) stated that companies that facilitate ransomware payments to actors on behalf of victims risk violating OFAC regulations.
WAN

4 ways to improve WAN security

The Internet, distributed workforces, mobile devices, and cloud service have all combined to create new opportunities for companies – and new challenges for CIOs.

5 Things Your BYOD Policy Should Include

BYOD policies are excellent for cost-saving and innovating. But if you don't create a formal policy, you may introduce security vulnerabilities into your business. From regulating operating systems through to maintaining high-security levels, here's what you should do.

Gift Card Scams Go Mobile

One of the most common email scams we are seeing right now…

Chrome Zero-Day in the Wild

Are you running on the latest version of Chrome? Last week, Chrome…

Beware: Tech Support Scams

Nowadays, tech support scams are some of the most favorite…