How to stop a business email compromise attack

Business email compromise (BEC) attacks are exploits where cybercriminals get unauthorized access to a business email account to steal the owner’s identity. The compromised accounts are then used for carrying out highly convincing social engineering scams against...

read more

5 Telltale signs of a ransomware attack

Ransomware attacks are widespread and usually take victims by complete surprise. Then, they’re left struggling to make the choice between paying the ransom or risk losing their data for good. Fortunately, there are several warning signs that cybercriminals are already...

read more

How to spot and avoid phishing scams

Phishing scams used to be easy to spot because of their incredible claims. Take for example the infamous Nigerian prince scam, which asks victims to disclose financial information so that the royal prince may purportedly deposit his overflowing cash into their bank...

read more

The menace of insider threats

Today, the risk posed by having sensitive information leaked to the wrong hands is pervasive. Technology has made the storage, accessibility, and shareability of information greater than ever, but the possibility of that information being made available to parties or...

read more
Skip to content