Would You Fall for a Phishing Scam?

May 10th, 2018

Phishing is one of the most prevalent and efficient ways for cyber criminals to exploit employees and gain access to sensitive data. Instead of looking for system vulnerabilities, they are targeting human ones by creating sophisticated campaigns intended to trick you and your staff into providing sensitive data to them.

Read More

The Fundamentals of Social Engineering: What Every Business Needs to Know

May 02th, 2018

Being cyber aware is a business imperative, and understanding the fundamentals of social engineering is critical to that awareness.  Because the cyber criminals are targeting YOU.  Not the vulnerabilities in your systems, but you and your team.

Read More

ALERT: New Gmail Password Reset Scam Circulating

April 03th, 2018

Warning!  There is a new - and very clever - Gmail Password Reset scam circulating.

Read More

Stay Alert for Business Email Compromise Scams

January 03th, 2018

Business Email Compromise (BEC) scams are a growing problem, costing U.S. companies over $1.5 billion in business losses, according to the FBI’s statistics.  As one of the most dangerous cyber threats targeting businesses of all sizes, it’s important to understand what it is, how it works and how to detect one.

Read More

Learn From These Real-Life Phishing Email Examples

November 20th, 2017

The bad guys are working overtime out in cyberspace right now, which greatly increases your chances of encountering a phishing email (or twenty) over the next several weeks. Knowing what to look for is the best way to avoid a bad click and the resulting consequences, so we dissected some examples that we received just last week, pointing out...

Read More

How to Test a Link Without Clicking On It

July 07th, 2017

Think before you click.  It’s great advice and we repeat it and share it frequently, given the security risks associated with clicking links in phishing emails, malvertising or spoofed webpages.  But we also live in the real world -- where sometimes you just want/need/have to click -- so we wanted to share some practical tips on how to test a...

Read More

The Best Defense Against Phishing Is A Cautious End-User

May 10th, 2017

Last week’s sweeping phishing scam impersonating a Google Docs request underscored a critical point in cybersecurity: Your defense against phishing is largely in the hands of your end-users.  It’s an important reminder that “think before you click” isn’t just a helpful saying, it’s actually an important barrier between your data and the...

Read More

ICYMI - Round-up of cybersecurity information and resources

December 15th, 2016

We focused on cybersecurity and network security a lot this year (because it's just THAT important!), so in case you missed any updates, webinars, or resource downloads, we have put them all together in one post for you.  Here's to staying safe in cyberspace!

Read More

How to Spot Phishing Attacks and Keep Your Business Network Safe

March 04th, 2016

Do you know how to spot phishing attacks and keep your business network safe from threats like ransomware and identify theft?

One of the mainstays in a hacker's arsenal is the phishing attack. Phishing is defined as a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading...

Read More

The Scary Truth About Ransomware and What You Can Do About It

February 25th, 2016

ALERT: Please be advised that there is a marked increase in ransomware attacks against businesses nationally. As you may have seen, this issue recently made headline news, with a high profile attack on Hollywood Presbyterian Medical Center in Los Angeles. A number of police departments around the country have also been targeted.

Read More
Sign Me Up for the CT Blog

Recent Posts

Categories

see all