Tag: cyberattack

April 14, 2020

Passly Packs 7 Essential Features to Secure a Remote Workforce

Today’s worker can stay connected to the systems and data that they need to work efficiently anytime from anywhere. Remote work isn’t just convenient for companies – it’s also convenient for cybercriminals. Take a look at 7 features of Passly that can quickly mitigate that threat.

Read More
a hand holding a piece of papaer that says phishing scam on it is pictured passing the paper to someone with a handful of cash.

FBI Warns Against COVID-19 Business Fund Transfer Phishing Scams

A new FBI warning outlines a special kind of phishing scam targeting c-suite and accounts payable staff – proving that phishing training is necessary at every level.

Read More
April 10, 2020

Malware-Laden COVID-19 Emails Exploit MS Office Vulnerability

The Secret Service warns that clever new phishing attacks simulating official emails, files, and links are being perpetrated by cybercriminals looking to take advantage of the anxiety created by COVID-19 and exploit an old MS Office vulnerability.

Read More
A laptop computer screen showing a brown-haired caucasian woman and an african american man on a desk with a monstera plant and an orange striped cat

Zoom Brings New Cybersecurity Threats to the Table

Zoom may be the new way to conduct business during the COVID-19 pandemic, but it’s also the new way for cybercriminals to attack systems and data using some fresh tricks to snare unsuspecting workers.

Read More
Three envelopes are shown open on a blue background, two containing white papers and one containing a paper with a skull and crossbones indicating malware
April 09, 2020

CISA: Massive Increase in COVID-19 Phishing Attacks

CISA released a warning about a massive increase in phishing attacks referencing COVID-19. Cybercriminals aren’t just using old tricks in new ways, they’ve added to their playbook.

Read More
February 25, 2020

Consumers Are Skeptical About Biometric Data Security: How Companies Can Respond

In 2014, Apple’s introduction of the iPhone 6 was more than just an exciting iteration of its flagship product – it was the launch of Touch ID. This blockbuster device ushered in a new era of widespread biometric data use for the layman. Fingerprints had replaced passcodes as device gatekeepers, charged with protecting the most important, sensitive information.

Read More
February 18, 2020

Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries have some form of privacy regulations on the books, and another 10% are drafting legislation.

Read More
February 10, 2020

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New York’s “Stop Hacks and Improve Electronic Data Security (SHIELD) Act.”

Read More
February 06, 2020

The Importance of Building Better Passwords

Good password hygiene is one of the easiest ways for businesses and consumers to protect their accounts from the millions of attacks threatening personal data every day.

Read More
January 29, 2020

That relationship is toxic for you: Why you may need to swipe left on your favorite [email protected]$!

Since the start of the new year, we’ve been sifting through billions of compromised email addresses and passwords found on the Dark Web looking for interesting trends in password behavior. Rather than just give you the top 10 passwords to avoid, we wanted to take a closer look at user behavior when creating passwords and how those behaviors lead to predictability and potential exploits. Passwords are often deeply personal expressions of oneself with the goal of making them easier to remember. However, remembering which password is which is becoming increasingly difficult in our hyper-digital daily lives. In fact, it is estimated that average US adult has between 90 and 135 different applications that require a set of credentials (typically a username and/or email address and password combination) for access.

Read More

Please fill in the form below to subscribe to our blog