Why seasonal employees can unknowingly leave companies to a broad range of cyberattacks.
It’s the end of May and summer is just around the corner. If you’re like many businesses, you might be getting ready for a slew of interns or summer workers filing the ranks of new team members around the office. It’s definitely nice seeing new faces, but with those faces might come some new security holes.
You see, employees represent one of the biggest threats to your network cybersecurity.
continue reading
Truth of the matter—there are way more job openings than experienced candidates today.
Cybersecurity jobs are abounding. If you go on Indeed, LinkedIn, or some other flavor of job site, you won’t have a hard time finding openings for cybersecurity positions—some looking for newbies to the field (maybe those that have some education in cybersecurity) and others looking for years of experience.
What employers are finding? Security jobs are going unfilled. Unfilled to the point that many big employers are starting to scrape the bottom of the barrel. In today’s cybersecurity departments, a lot of those tech companies that have been actively recruiting people in cybersecurity-related positions for years, there simply aren’t enough people with real world knowledge. What many companies, including the likes of IBM and other hi-tech companies are finding is that no experience is required.
continue reading
Think back ten or twenty years. What were parent’s biggest fears for their kids? Growing up well over 20 years ago, I remember my mom was afraid of drugs. Maybe kidnapping or taking candy from strangers, but mostly my parents didn’t have to worry about all of the things—mostly technology related—that parents and families have to think about today.
While the internet is hard to imagine living without in 2019, it has the potential to be harmful if we’re not careful. Today, as summer starts to hit schools across the country, I want to walk through some tips to keep your kids safe online (while they have more time potentially on their phones and computers).
continue reading
Let’s face it. We all make mistakes.
Even clicking on a malicious link in a phishing email can happen to the best of us. Sometimes it’s because we’re in a huge hurry and overlook double checking everything before making a click, or sometimes the phishers are exceptionally clever with their scam.
Whatever the reason for your user clicking on that link or email attachment or replying with sensitive information they should have thought another second before sending, we all make mistakes. Today I want to walk through some steps to take after clicking on that phishing scam.
continue reading
What is one of the greatest and most common threats to your users?
What attack has infected networks, stolen millions of dollars, snatched password credentials and created the most chaos in modern history on business large and small?
Phishing.
Phishing attacks are by no means a new issue. But as modern technology and innovation has grown, so too have innovative ways criminals exploiting those innovations. As our societies and our businesses have gotten more connected, what have criminals done?
continue reading
When we first started bringing attention to phishing scams years back, they were pretty easy to spot. Criminals didn’t really think about how to actually sell their scam to their victims. Their emails were chock full of typos and their grammar was so bad that even your grandma could have read through the email and known that something was up!
Fast forward to today, criminals are using sophisticated tools to spoof messages and websites that actually look like the real deal. These phishing emails might even include official company logos that completely make them seem legitimate.
This is just one thing to watch out for. Criminals have also learned that subject lines with urgent messages get people’s attention. But there are a TON of things to be thinking about and looking for in phishing scams to make sure your users stay protected.
continue reading