Phishing Expeditions Can Ruin Your Day

Phishing Expeditions Can Ruin Your Day

By now, pretty much everyone who uses a computer has heard about phishing scams. For the sake of clarity, however, let’s recap: In a phishing attack (typically carried out by email, but also increasingly by text messages and other communications channels), the...
Don’t Be Fooled By A Spoofing Attack

Don’t Be Fooled By A Spoofing Attack

Ah, the art of disguise. Ever since the Big Bad Wolf and Little Red Riding Hood (and probably earlier), one of the oldest tricks in the book is for a miscreant to pretend to be someone else—a phone or appliance repairman, a contractor, someone from the government, or...
The Worst Cybersecurity Decisions SMBs Make

The Worst Cybersecurity Decisions SMBs Make

If you run or work in a small- or medium-sized business (SMB), ask yourself if any of these statements sounds familiar: “My staff and I are too smart to be fooled into installing malware on our computers.”“My business is too small for hackers to be interested in.”“Of...