Following The Trends Every year, IBM releases their annual X-Force Threat Intelligence Index which in layman’s terms is essentially an overview of the past years cybersecurity risks and trends. This year’s recent index for instance took a look at 2019’s most popular methods of attack used by hackers. These findings found that the most used…Read More
T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…Read More
Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…Read More
Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.
Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.Read More
Phishing using data URI’s embedded in websites distributed using URL shortening services.Read More