Category: Threats

August 03, 2017

NotPetya – a Threat to Supply Chains

Ukraine is a nation under digital siege. Over the past few months, it has suffered through four widespread infrastructure attacks, with the Russian government being suspected as the driving force behind the attacks — although to date, there’s no clear evidence of this.

Read More
July 06, 2017

What an MSP can do to Protect Their Clients from the Dark Web

Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. As an MSP or MSSP, you are doing your part to secure and monitor your client’s network and provide a seamless user experience. However, through no fault of your own, your client’s and their employees are not making your job easier by creating credential-based blind spots that until now were hard to detect and mitigate.

Read More
June 12, 2017

The Ransomware Assault on Healthcare

Hospital networks can unfortunately become a goldmine for attackers that use ransomware worms as their weapon. If deployed, lives may be endangered, hospitals usually must pay the ransom, or pay to get files retrieved and its reputation could be damaged. Because these attacks are increasing due to lucrative benefits, teaching and reminding hospital staff to use valuable cyber hygiene is imperative.

Read More
June 08, 2017

Why Managed Service Providers Must Monitor for Compromised Credentials

If your customers are like most organizations, 75% of their employees recycle or use a variation of the same password across most of the systems and websites they access – both on and off their employer’s network. And this practice is becoming increasingly dangerous.

Read More
June 01, 2017

How to Detect if Your Organization’s Email Credentials Have Been Stolen & How to Prevent Phishing.

Stolen email credentials are an often exploited vulnerability for government and corporate networks. In fact, Verizon announced in a recent study that 91% of phishing attacks specifically targeted email credentials.

Read More
May 22, 2017

Five Steps to Protect Your C-Suite from Corporate Identity Theft

Since 2003, the FBI has tracked more than $740 million dollars lost to business email compromise (BEC) fraud in the United States. Who’s the main target? None other than the C-Suite. Led by organized online criminal groups, BEC is one of the fastest growing types of financial fraud.

Read More
May 18, 2017

Three Types of Business E-Mail Compromise Scams You Need to Recognize

The internet has changed the way businesses operate around the world. Having access to a tool of this caliber is essential to the way corporations function today, but it also has its downfalls. In this case, we’re referring to the incredibly dangerous threat most business owners are either unaware of or hardly ever think about – cybercrimes like Business Email Compromises (BEC).

Read More
May 08, 2017

Phishing Scam Targets Human Resources Professionals

The IRS recently issued an alert, warning Human Resources or Payroll professionals to be on the lookout for an email scheme designed to steal employee data from W-2 forms. The scam has already claimed some high profile victims, such as Snapchat, and is especially threatening as employees are in the midst of tax season.

Read More
May 04, 2017

Can Your Employees’ Personal Identity Theft Affect Your Organization?

Identity theft continues to grow at an alarming rate. Statistics show that 3% of the U.S. population experienced credit card fraud at least once in 2014. Not to mention that, “an estimated 17.6 million persons were victims of one or more incidents of identity theft,” in the same year, as reported by theU.S. Department of Justice. This is up by a significant amount from the 16.6 million cases of identity theft in 2012.

Read More
May 01, 2017

7 Benefits to Providing Identity Theft Protection to Your Employees

Among all of the security features a company needs in order to truly protect itself, it’s easy to forget about the most important aspect of an organization that needs to stay out of harm’s way – its people. Employees are becoming increasingly more vulnerable to cyber threats, just as your company is as a whole.

Read More

Please fill in the form below to subscribe to our blog