Just how much of a threat is Business Email Compromise?
A guide to Business Email Compromise (BEC): how it works and how you can preventRead more
Phishing 101: How Phishing Attacks and Scam Emails Work
Phishing is a form of cybercrime, where an attacker poses as a legitimate institution andRead more
Social Engineering – What Is it and How to Prepare For it?
Social engineering is a set of tools and practices which rely on social manipulation andRead more
Security Awareness Training Doesn’t Work – Here’s How to Fix it.
If done efficiently, security awareness training helps fend off phishing attacks like a shield. Unfortunately,Read more
What is Spear Phishing and How Do You Recognize It?
When a determined malicious actor has the time and money and is looking for aRead more