You invested in the latest security software and even hired a great IT team. However, one misstep by an unsuspecting employee and a wrong click on a malicious link later, you are staring at a costly breach that threatens to jeopardize the future of your business.
The Role of Leadership in Cyber Awareness: How Business Leaders Can Set the Tone
Phishers use encrypted sites to scam
A keylogger found in HP laptops
How to protect your VoIP system from phishing
VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. Naturally, shrewd scammers have found a way to use VoIP as a means to carry out ‘vishing scams,’ a new type of phishing whereby fraudsters make phone calls, pose as a business or financial partner, and request private details.
What you need to know about malware
Why Nyetya is more threatening than WannaCry
Firmware: the threat most users overlook
Are your printers safe?
Ransomware demands more victims for freedom
Ransomware has become a fast-track for making money for some hackers this holiday season. But instead of just demanding a small payment for the decryption code that will unlock their computers, some hackers are demanding that victims sacrifice two other friends to ensure they receive the code they need.
IT security predictions for 2016
As shown by recent high-profile hacking scandals - targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison - cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers.
- 1
- 2