<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog


Stacy Willis

Recent Posts

Social Engineering Examples: Business Email Compromise

Posted by Stacy Willis on Jun 21, 2016 9:00:00 AM

Social engineering and phishing scams come in many different forms, infinite forms really as attackers are constantly coming up with new ways to trick victims. One flavor of attack has become increasingly popular because it is so effective: Business Email Compromise (BEC). In 2015 alone, BEC attacks cost companies over $1.2 Billion. A BEC attacks all have these phases:

Read More

Topics: Phishing

Cyber Insurance Coverage: Will it be there when I need it?

Posted by Stacy Willis on Jun 15, 2016 4:03:28 PM

Cyber Insurance is one of the more tricky subjects for companies to tackle today. It is becoming increasingly common among businesses of all sizes and is even beginning to be looked at as a requirement when partnering with other firms.

Read More

Topics: Cyber Insurance

You don't have to be high-tech to use 2 Factor Authentication

Posted by Stacy Willis on Apr 20, 2016 7:00:00 AM

What is it?

Let's start with the definition of authentication. Essentially the process of authentication involves proving you are who you say you are. There are three ways of authenticating:

Read More

Topics: Security technology

What is a Zero-Day Attack?

Posted by Stacy Willis on Apr 6, 2016 7:00:00 AM

There are plenty of cyber security buzzwords flying around these days but few are heard as often as the phrase "zero-day attacks." In fact, it even made an appearance in our article on predicted threats for 2016. Experts see zero-day attacks becoming much more prevalent and continuing to do so throughout 2016. While many people have heard the phrase, we often find that unless the person is highly technical or a security professional, they don't know what it means. So we are here to help!

Read More

Topics: Attack, Malware

Cyber Security and your Kids: what you need to know.

Posted by Stacy Willis on Mar 30, 2016 7:00:00 AM

One of the scariest things as a parent these days is technology. All parents worry about the safety of their kids, but at no point in the past have kids been so connected. This connected world offers new dangers to our children that we need to make sure we educate ourselves on. So what can you as a parent do to keep your kids safe?

Read More

Topics: Children

Vendor Risk Management: What are your vendors costing you?

Posted by Stacy Willis on Mar 24, 2016 7:00:00 AM

Do you know what your vendors are doing with your data? Do you know how they are using their access to your systems? All too often we see companies who hand over access to vendors with little to no background research and then allow them to run around unsupervised in their systems. Recent data breaches have shown us that vendor management is clearly cause for concern. There have been several very high profile (and VERY expensive) data breaches caused by poor vendor risk management practices.

Read More

Topics: Risk Management

4 Questions to ask about your Cyber Insurance Coverage

Posted by Stacy Willis on Mar 9, 2016 7:00:00 AM

As security consultants, we've come across cyber security programs in businesses of all sizes and within all industries. One of the most common mistakes we've seen in all areas are companies that think all their cyber security problems are solved simply by having cyber insurance coverage. Many companies believe that as long as this insurance policy is in place, they don't need to spend time worrying about setting up programs and staying on top of cyber security internally.

Read More

Topics: Cyber Insurance

Phishing examples: Payroll and HR scams

Posted by Stacy Willis on Mar 8, 2016 10:40:07 AM

The IRS has just issued an alert about a specific type of phishing scam affecting payroll and HR professionals. (What is a phishing scam? Learn the basics from our guide). Most recently seen in a very high-profile breach over at Snapchat, this attack takes advantage of team members who have access to payroll or W-2 data on employees.

Read More

Topics: Phishing

Health care under Cyber Attack: lessons from recent data breaches

Posted by Stacy Willis on Mar 2, 2016 7:00:00 AM

Hospitals and health care providers are increasingly becoming the target of large scale cyber attacks - and they are nowhere near ready for it!

Read More

Topics: Malware

Identity Theft: Top 10 mistakes you're making with your personal information!

Posted by Stacy Willis on Feb 24, 2016 1:34:20 PM

We are all guilty of picking convenience over doing the extra work to make sure our information is protected at some point or another. But are you committing some of the biggest sins that will put you at risk for identity theft? Find out how to protect yourself from identity theft by fixing these mistakes!

Read More

Topics: identity theft