We all know (or should know) that human error accounts for the majority of breaches. Phishing gives hackers entry to a business’s front door by manipulating the employees who work there.
A keylogger is a tool designed to silently spy and record our daily activities on a device. Once a keylogger is installed, it can feed information directly to a cybercriminal in real-time.
COVID-19 has presented businesses with a new challenge in keeping their company safe and it starts with employee health. As they re-open in the wake of the pandemic, they must keep track of individual health with...
Spear phishing is often considered one of the most dangerous forms of phishing. These well-crafted malicious emails include personal details that can make them very convincing and difficult to spot.
Credit card skimming is a criminal’s attempt to steal the financial information residing on a debit or credit card via a malicious card reader. With so much emphasis on digital security threats, it’s...
People often learn lessons from past mistakes, but why do they not take this same approach with password security? Password security is no joke – read on to learn more about why people need to change their...
The benefits of using mobile devices should never compromise information security. Slow down, think before you click, and always follow your organization’s policies.
The Coronavirus has brought about some major change in our daily lives. One change that may be here to stay for some employees is Work from Home. Whether you are in the office, working from home or both, it is...
Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months. Could the...
