What You Need to Know About Financial Fraud
Guest User Guest User

What You Need to Know About Financial Fraud

Financial fraud continues to be an easy means for criminals to make money from unsuspecting targets. As attacks continue to grow in volume, it is important that you are able to recognize the warning signs.

Read More
2024 Cybersecurity Predictions
Guest User Guest User

2024 Cybersecurity Predictions

The new year brings new and more sophisticated threats to prepare for. Advancements in technology and changes in the economic climate have provided ample opportunities for cybercriminals to fill their pockets. Keep reading to learn about our predictions for cybersecurity trends you’ll see this year.

Read More
Grandparent and Emergency Scams
Dylan Gallant Dylan Gallant

Grandparent and Emergency Scams

In this blog, we’ll take a deep dive into the grandparent scam and explore how you can protect yourself and your family members from these types of threats.

Read More
Phishing Deep Dive: How to Effectively Phish Employees
Guest User Guest User

Phishing Deep Dive: How to Effectively Phish Employees

Phishing is not about tricking employees into falling for your latest phishing simulation. Instead, phishing should be viewed as an opportunity to educate and prepare your employees to catch and report suspected phish. In this blog we’ll cover when employees are most susceptible to falling for phishing attacks and the 5 Rs of phishing to better ensure your phishing security awareness program will prepare employees to be your best first line of defense against cyber risk.

Read More
How to Implement Consequences and Rewards in Your Security Awareness Program
Guest User Guest User

How to Implement Consequences and Rewards in Your Security Awareness Program

Your security awareness program can’t be based on just consequence or rewards – it needs to incorporate both. Understanding how to implement both consequences and rewards into your program can feel like a bit of a balancing act, so we’ve broken down how both work and can be easily incorporated into your existing security awareness program.

Read More
The Fundamentals of a Security Awareness Program
Guest User Guest User

The Fundamentals of a Security Awareness Program

Whether you’re just getting started and don’t have a security awareness program in place, or you’re looking to build on to an existing program, for cybersecurity awareness month this year we’re bringing it back to the basics and covering the fundamentals of a security awareness program.

Read More
Protecting Company Data Out of Office
Guest User Guest User

Protecting Company Data Out of Office

The loosening of pandemic related restrictions such as social distancing means that the occasional after work get together with colleagues is now back in order, and folks that haven’t seen each other in a long time are eager to celebrate. Employees who work with sensitive data are entrusted to keep that data safe and have a responsibility to safeguard that information. But what happens when they are invited out after work?

Read More
7 Cyber Best Practices for Remote Workers
Guest User Guest User

7 Cyber Best Practices for Remote Workers

Whether the ideal work environment is at a café, a library, a local park or your kitchen table, there are easy ways to protect the privacy of your work and allow you the flexibility to work from almost anywhere. So, what can your organization do to promote cyber best practices for hybrid and remote workers?

Read More
Multi-Factor Authentication (MFA): What it is and Why We Should Use it
Guest User Guest User

Multi-Factor Authentication (MFA): What it is and Why We Should Use it

Enabling two-factor authentication or multi-factor authentication is an excellent way to add that extra layer of protection to work or personal accounts. In this blog, you’ll learn about the different forms of authentication and why enabling either two-factor authentication or multi-factor authentication is considered a cybersecurity best practice.

Read More
Cyber True Crime: The Affiliate Part 5
Guest User Guest User

Cyber True Crime: The Affiliate Part 5

Welcome back to Part 5 of the Cyber True Crime series The Affiliate. In past blogs, we covered the history of NetWalker, how a RaaS ransomware gang functions, how Sebastien Vachon Desjardins, or the Affiliate, attempted to hide his criminal activity through international servers and in our last blog the organizations he targeted in his attacks. In this installment, we’ll begin to unravel how the FBI began tracking the Affiliate down through the international servers and his multiple email addresses.

Read More
Cyber True Crime: The Affiliate Part 4
Guest User Guest User

Cyber True Crime: The Affiliate Part 4

Welcome back to Part 4 of the cyber true crime series: The Affiliate. In this installment, we’ll cover the organizations that the Affiliate targeted over the span of a few weeks.

Read More
Cyber True Crime: The Affiliate Part 3
Guest User Guest User

Cyber True Crime: The Affiliate Part 3

Welcome back to Part 3 of the cyber true crime series The Affiliate. In Parts 1 and 2 we went over how a ransomware gang typically operates, how an organization finds out they have been the target of a NetWalker ransomware attack and how one becomes involved in the criminal organization. In this installment, you’ll learn how an international server works and how the Affiliate used them.

Read More
In for the Long Haul: The Long-Term Effects of a Data Breach for SMBs
Guest User Guest User

In for the Long Haul: The Long-Term Effects of a Data Breach for SMBs

It’s a common belief that cybercriminals target large businesses for data breaches; however, the truth is that in 2021, small and medium businesses (SMBs) were the biggest and most easily accessible targets for data breaches. Sontiq’s Mid-Year 2021 report concluded that 69% of all data breaches for this year so far have been to small businesses.

Read More