Social engineering and phishing scams come in many different forms, infinite forms really as attackers are constantly coming up with new ways to trick victims. One flavor of attack has become increasingly popular because it is so effective: Business Email Compromise (BEC). In 2015 alone, BEC attacks cost companies over $1.2 Billion. A BEC attacks all have these phases:
Cyber Insurance is one of the more tricky subjects for companies to tackle today. It is becoming increasingly common among businesses of all sizes and is even beginning to be looked at as a requirement when partnering with other firms.
Topics: Cyber Insurance
What is it?
Let's start with the definition of authentication. Essentially the process of authentication involves proving you are who you say you are. There are three ways of authenticating:
Topics: Security technology
There are plenty of cyber security buzzwords flying around these days but few are heard as often as the phrase "zero-day attacks." In fact, it even made an appearance in our article on predicted threats for 2016. Experts see zero-day attacks becoming much more prevalent and continuing to do so throughout 2016. While many people have heard the phrase, we often find that unless the person is highly technical or a security professional, they don't know what it means. So we are here to help!
One of the scariest things as a parent these days is technology. All parents worry about the safety of their kids, but at no point in the past have kids been so connected. This connected world offers new dangers to our children that we need to make sure we educate ourselves on. So what can you as a parent do to keep your kids safe?
Do you know what your vendors are doing with your data? Do you know how they are using their access to your systems? All too often we see companies who hand over access to vendors with little to no background research and then allow them to run around unsupervised in their systems. Recent data breaches have shown us that vendor management is clearly cause for concern. There have been several very high profile (and VERY expensive) data breaches caused by poor vendor risk management practices.
Topics: Risk Management
As security consultants, we've come across cyber security programs in businesses of all sizes and within all industries. One of the most common mistakes we've seen in all areas are companies that think all their cyber security problems are solved simply by having cyber insurance coverage. Many companies believe that as long as this insurance policy is in place, they don't need to spend time worrying about setting up programs and staying on top of cyber security internally.
Topics: Cyber Insurance
The IRS has just issued an alert about a specific type of phishing scam affecting payroll and HR professionals. (What is a phishing scam? Learn the basics from our guide). Most recently seen in a very high-profile breach over at Snapchat, this attack takes advantage of team members who have access to payroll or W-2 data on employees.
Hospitals and health care providers are increasingly becoming the target of large scale cyber attacks - and they are nowhere near ready for it!
We are all guilty of picking convenience over doing the extra work to make sure our information is protected at some point or another. But are you committing some of the biggest sins that will put you at risk for identity theft? Find out how to protect yourself from identity theft by fixing these mistakes!
Topics: identity theft