How to Save a Billion Dollars
One cybersecurity threat caused $1+ billion dollars in losses last year, and the threat is still evolving. What is it? Ransomware? Insider Threats? Nation-State Attacks? No - Email.
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Your money or your life: Digital extortion scams
An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.
Bitcoin Bomb Scare Associated with Sextortion Scammers
This blog was written by Jaeson Schultz. Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities,...
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...
4 Ways Collaborative Technology Can Lead to Happier Bank Employees
In established companies, people are the biggest cost—as well as the biggest asset. As banks compete for the best talent, many are realizing they need to re-examine the fundamentals of how they operate. Even traditional financial institutions built on top-down process and authority are looking for ways for employees to drive informed, collaborative decision-making. […]
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]