What is Spoofing?

Most of us may already know the term spoofing, as it is commonly used in the real-world to describe an alternate variation of something. Spoofing, from a cybercrime standpoint refers to the cybercriminals action to disguise a phone call, website, or email for malicious purposes. By falsifying their true appearance,...

Employee Errors

Phishing is when a cyberattack is disguised and delivered using email as the carrier or weapon. Through very convincing and cleverly designed messages, the recipient is tricked into believing that the content or sender is authentic, and they then act upon instructions within the message. This means that the sender’s...

What are Keyloggers?

We take many steps to protect our information and privacy when using devices at home or within the office. However, if your device has a keylogger installed, the data you search, websites you are visiting, and login credentials you are entering can all be easily accessible to a cybercriminal. A...

Employee Privacy in a Pandemic

Gathering data for the sake of having data is a mistake that many people make. Effort is put into the research, without a clear idea of how or why you need the information that you’ve put time into gathering. Make sure it is worth it. Additionally, when this is done...

What is Spear Phishing?

While phishing attacks get the most press, spear phishing attacks can be much more dangerous. A phishing email has no intended target and is designed to barrage thousands of endpoints, hoping to get a bite. Spear phishing on the other hand, generally takes a targeted and thoroughly researched approach to...

Credit Card Skimming

Credit and debit cards are a simple and convenient alternate payment technique in lieu of cash. But, with so much of our financial information residing on these cards, they can be a major liability, if they fall into the wrong hands. Credit card skimmers have been around for years and...

Changing Our Attitudes About Password Security

Most situations teach us lessons so that we don't repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it's off before doing it again. If you run out of gas on a highway, on future drives, you'll be on the lookout...

Mobile Threats (And How to Avoid Them)

Smartphones and tablets allow us to work from almost any location and improve our quality of life. However, the use of these mobile devices can present significant security challenges from both a personal and professional standpoint. Here are five common threats to watch out for and how to avoid them:...

Cybersecurity in a Changing Work Environment

Things have been pretty crazy these last few months. By no means are we back to normalcy or out of the woods, but there are signs of progress. Regardless of where the next few months or years takes us, there is a clear indication that the landscape of many working...

10 Tips to Help Protect Your Organization from Ransomware

Ransomware wreaked havoc among individuals and organizations over the past few years, making a name for itself across the globe. Although the chatter around the malicious software may have quieted down, the threat is very much alive, and working hard to hand out ultimatums to its victims - pay up...

What is Two-Factor Authentication (2FA)?

When it comes to cybersecurity, the terms and acronyms thrown around by professionals can seem confusing, making the entire concept of security a daunting one to understand. Two-factor authentication, or 2FA, can be one of those terms. Simply put, it is the process of using not one method of securing...

What are IoT devices?

"IoT" is a relatively new term, one that many of us may be unfamiliar with. However, there is a good chance that you're using at least one IoT device on a daily basis! The simplest definition of an IoT (Internet of Things) device is any object that can connect to...