How Using the SLAM Method Can Improve Phishing Detection
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it … Read more
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it … Read more
How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a … Read more
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 … Read more
The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has 10.37 devices connected … Read more
One of the big draws of a laptop computer is that you can use it anywhere. You don’t need to have it plugged in all … Read more
“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working … Read more
Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business … Read more
Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These can be any supplier – digital or non-digital – … Read more
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used … Read more
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is … Read more