You can put all the right protections and policies in place, but how do you know they’re actually working and being enforced? As businesses scale to meet rising demands, getting a clear visibility of …
Business Email Compromise and Defense
Email is critical to the lifeblood of modern business. Business email compromise (BEC) is no joke, and continues to increase despite increased awareness. The people behind these scams know how to …
Continue Reading about Business Email Compromise and Defense →
Data Privacy in the Digital Age for Retailers
For retailers, the new environment is presenting challenges concerning data governance and a host of disparate laws to consider. A complete privacy due diligence program includes …
Continue Reading about Data Privacy in the Digital Age for Retailers →
Ransomware: A Threat to Your Organizations
We recently wrote an article on ransomware for In-Sec-M, Read on.What is Ransomware?Ransomware is a type of malware that denies a user’s access to files or systems until a sum of money is …
Continue Reading about Ransomware: A Threat to Your Organizations →
Cyber Security Incident Preparedness
Traffic is a good analogy when discussing cyber security incident preparedness and events. because we can imagine a wide range of severity (fender bender, 3 car pile up that blocks a major artery, …
Continue Reading about Cyber Security Incident Preparedness →
How Business Email Fraud Hits Small Businesses
Targeted. Advanced. This are terms that have a very different meaning for lots of people. Attacks start as “mass scale, attacks of opportunity”. Broad phishing campaigns, credential stuffing attacks …
Continue Reading about How Business Email Fraud Hits Small Businesses →