How Often Do You Need to Train Employees on Cybersecurity Awareness?
Blog Guest User Blog Guest User

How Often Do You Need to Train Employees on Cybersecurity Awareness?

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link.

You wonder why you seem to need to train on the same information every year. But you still suffer from security incidents.

Read More
Did You Just Receive a Text from Yourself Learn What Smishing Scams to Expect
Blog Guest User Blog Guest User

Did You Just Receive a Text from Yourself Learn What Smishing Scams to Expect

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more.

This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts for shipment tracking and sale notices. The medical industry has also joined the trend. Pharmacies send automated refill notices and doctor’s offices send SMS appointment reminders.

Cybercriminal groups are also using text messaging to send out phishing. Read more on our blog.

Read More
How Using the SLAM Method Can Improve Phishing Detection
Blog Guest User Blog Guest User

How Using the SLAM Method Can Improve Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.

Why has phishing remained such a large threat for so long? Because it continues to work.

Read More
Which Form of MFA Is the Most Secure? Which Is the Most Convenient?
Blog Guest User Blog Guest User

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack.

With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities.

How do you protect your online accounts, data, and business operations? One of the best ways is with multi-factor authentication (MFA).

Read More