Tag Archives: Phishing

COVID-19 and Staying Cyber Secure

As news of Covid-19 grows in the news, so do cyber attacks, taking advantage of newly-remote workers and the population wanting to learn more of our evolving landscape. Be alert and cautious of unfamiliar emails or calls that disguise themselves as official health organizations you receive or promises of the stimulus package payout. Here are […]

Popular Cyber Attacks: Why Due Care is so Important for Reasonable Security

Popular Cyber Attacks and Due Care for Reasonable Security.  As children, we enjoyed reading the many fairytales that began with, “Once upon a time.”  As adults in the workplace, we regrettably read the stories of so many recent cyber attacks that start with, “Someone opened a phishing email.”

Evolution of Phishing Attacks and the Billions it is Now Costing Corporations

Evolution of Phishing Attacks and the Billions it is Now Costing Corporations AUTHOR: Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR It was 23 years ago that the first Nigerian phishing attacks appeared in the inboxes of users across the world. Known today as the Nigerian 419 scams, these emails of deceit were cleverly crafted around […]

Simple Ways to Prevent Multi-Million Dollar Losses from BEC

AUTHOR: Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR In February of 2016, Fischer Advanced Composite Components (FACC), an Austrian aerospace parts maker servicing customers such as Airbus and Boing, fired its CEO of 17 years. The driving factor in the dismissal was the company’s reported income loss of 23.4 million euros during the encompassing fiscal […]

BEC Phishing is a Bigger Threat than Ransomware

BEC Phishing is a Bigger Threat than Ransomware. AUTHOR: Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR Ransomware stole a lot of headlines in 2016 as organizations across the world fell victim to it. From hospitals to city transit systems, the infectious malware invaded enterprises, encrypting files and generally wreaking havoc. For most of those afflicted, ransomware […]

ARE EMPLOYEE PERSONAL SOCIAL MEDIA ACCOUNTS MAKING YOUR NETWORK VULNERABLE?

Social media seems harmless enough especially when your employees stick to using it for personal reasons, but it can indirectly be responsible for critical security breaches. With some social engineering and patience, an attacker can use personal social media profile information to gain access to your corporate network. The attack is completely outside of your […]

ALERT: CRIMINALS REQUESTING W-2s VIA SIMPLE SOCIAL-ENGINEERING SCHEME

By Todd Hacke Tax season is a hectic time of year for not only organizations but their employees.  This year attackers are looking to take advantage of this turbulence with a simple social engineering inquiry that could land them a gold mine of personal and financial information.  It turns out all they have to do […]

8 Ways to Avoid Becoming a Human Hack

Avoid Becoming a Human Hack. I’ve become a fan of the show Impractical Jokers. If you haven’t seen it, three friends play jokes on the fourth, and he has to repeat whatever line is fed to him. The goal is to successfully convince random strangers to say or do a certain thing that they would […]