How to Save a Billion Dollars
4 min read
One cybersecurity threat caused $1+ billion dollars in losses last year, and the threat is still evolving. What is it? Ransomware? Insider Threats? Nation-State Attacks? No - Email.
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
5 min read
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Email – From Novelty to Nefarious
6 min read
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
Your money or your life: Digital extortion scams
5 min read
An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.
Bitcoin Bomb Scare Associated with Sextortion Scammers
1 min read
This blog was written by Jaeson Schultz. Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities,...
You’ve Got (Compromised) Mail!
3 min read
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...
Don’t Feed the Phish: Implementing DMARC
3 min read
The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...
4 Ways Collaborative Technology Can Lead to Happier Bank Employees
4 min read
In established companies, people are the biggest cost—as well as the biggest asset. As banks compete for the best talent, many are realizing they need to re-examine the fundamentals of how they operate. Even traditional financial institutions built on top-down process and authority are looking for ways for employees to drive informed, collaborative decision-making. […]
Attackers Evolve Tactics to Infiltrate Your Network via Email
3 min read
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]
1