Business

Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible? Create and Strictly Enforce a Password Policy: Passwords should be complex, randomly generated, and replaced regularly. In…

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year. What exactly is phishing? Hackers mimic the emails,…

4 ways cybercriminals use social engineering to steal your data

Social engineering is yet another tactic cybercriminals use to steal data from an unsuspecting company. However, this tactic is slightly different than typical methods, mainly because it preys on the human element. Here are a few of the most common ways social engineering could play out in your business. 1. They could send an email. The majority of people are…

Start typing and press Enter to search