Social media account takeovers are a serious problem, and their prevalence is only increasing. In 2022, the Identity Theft Resource Center (ITRC)1 received four times the number of inquiries about social media account takeovers compared to 2021. There are a number of reasons why social media accounts are so frequently targeted by scammers. First, social…
The Zero Trust security model is a way to deal with the problem of perimeterless security in an age of remote working and cloud networks. In this blog post, we discuss the meaning and importance of the Zero Trust security model for Small and Medium Businesses, from basic principles to business examples.
Passwords have been the standard authentication method for decades but are becoming increasingly insecure. Passwords can be easily guessed, stolen, or hacked, and many users reuse the same passwords for multiple accounts.
Security tactics such as IT audits, pentesting, vulnerability scanning, reports and alerts are highly sophisticated. Yet, social engineering hacking is able to circumvent this technology by ‘hacking’ our brain instead—taking advantage of our trust, fear, politeness, or inattention. This specific type of hacking may be supported by technology; but the catalyst is psychological exploitation.
Cyberattacks are becoming increasingly sophisticated and costly, and businesses of all sizes need to take steps to protect themselves. One of the best ways to do this is to implement a cybersecurity framework.
Business email compromises (BECs) are on the rise and now occur frequently. BECs are breaches of email accounts, and are particularly troublesome for businesses.
What does the FTC Safeguards Rule require of financial institutions? Does it apply to you? What should a compliance audit look like and who should conduct it? This blog post answers your burning questions on the latest updates to the FTC rule.
The reasons why remote work can increase the risk of a cyberattack are not always the ones you might expect:
Remote workers often use their own devices and networks, which may not be as secure as a company’s corporate network, to access company data.
I’m one of those fortunate people whose company supports a hybrid work environment. This means that I generally work from home, but can actually work from anywhere (in the office, at home, and on the go). On a typical day, I’m in my home office—where I have access to my company’s network and all the…
The Internet is often taken for granted, in both a professional and a personal capacity. You’d be hard-pressed to get anything done without it nowadays. This doesn’t mean it’s always safe to do so, however. There are many threats that lurk in the darkness of the Internet, and if you’re not careful, you could find…