Fighting spear phishing with artificial intelligence is the solution. An email arrives in your work inbox. No big deal. You probably get hundreds of messages every day. You recognize the sender. It’s your work friend Dave. It reads, “Dude, did you see Lebron last night? That was awesome!” You shoot back a quick, “Yes! I [...]
The US presidential election will soon be over. Email security and other cybersecurity issues have been making headlines throughout the race. As we near the actual election, there is evidence that multiple states have had their voter registration systems infiltrated. Word 2016 ELECTIONS written on white dices with flag of United States of America [...]
There may be no feeling less comfortable in modern life than the moment you panic about clicking on a link that appears to activate something very bad on your device. The five stages of grief follow in a few brief seconds: Anger (How could I be so stupid?) Denial (Maybe it’s nothing…) Bargaining (I promise [...]
Over 90% of all network breaches are caused by, or include, a phishing attack. What can you do to protect your organization? We recommend that you start with technical measures like our email security suite, but that’s not the only step you should take. No system is 100% effective and your employees can also put [...]
Business Email Compromise (BEC) is a serious matter. This email-borne hacking technique presents a radically more sophisticated version of the age-old “Nigerian Prince” scam. BEC targets businesses that regularly perform wire transfer payments to foreign entities. According to the FBI, the attacker uses a phishing approach, “Compromising legitimate business e-mail accounts through social engineering or [...]
The proliferation of social media and cloud based tools in everyone’s business and personal lives means that an ever-increasing percentage of your inbox is filled with emails that were generated from these disparate platforms. In addition to emails from Linkedin, Facebook, and Twitter, many people receive a steady stream of notifications from project management tools, [...]
What healthcare entities can do to protect themselves against phishing, ransomware, and breaches.
How the concept of security perimeters in InfoSec applies to phishing and spear phishing attacks.
Spear phishing is deadly, from a security perspective. With the stakes so high, see how the use of heuristics can help to assess whether an email is a spear phishing attack or just another harmless work-related communication.
Spear Phishing represents a huge threat to government security. Governments at all levels need to deploy specialized anti-phishing technology to protect their networks and their people.