There’s much debate going on today about what to do if your organization gets hit by ransomware. There’s really only two choices: pay it or don’t. And which side you come down on says a lot about your big picture perspective. Recently, U.S. Mayors, at their yearly conference, which represents over 1,400 mayors from U.S.
Phishing has been on the rise in form or the other, ever since users have started to use emails, messages, phones, etc. Every other month, around 1.5 million new phishing sites are created by cyber-criminals and add to the growing cybercrime world. Several of these sites employ ransomware as a tactic in order to extort
Another week goes by, and the world of cybersecurity is abuzz with a range of activity, as always. We know that keeping abreast with all these happenings can be taxing if done one at a time, and hence, we have gathered the top headlines for you, to skim through and gain insight into the progress
They say nothing is certain in life except for death and taxes. You can add one more to that list: phishing attacks. Hackers continue to do their homework and innovate as the number one cybersecurity threat refuses to be contained. According to an article on the Dark Reading website, “Email continues to be an extremely
When the Internet first began, there were just a handful of top-level domains in use. Top-level domains (TLD) are the letters that come after the “dot” in the URL. Examples include .com, .org and .net. One of the most-used phishing tactics is domain name spoofing. Domain name spoofing occurs when an attacker uses a domain,
The past week has seen a range of activity in the world of cybersecurity with cyber-attacks taking place, anti-phishing solutions being deployed, and a whole lot of other things happening. Below, there is a curated list of all significant headlines that you need to know about, to be at par with the progress in the
As another week passes by, the world of cybersecurity witnesses another round of developments and for the cybersecurity analysts, engineers and professionals, there are various updates that they need to catch up on. Realizing and acknowledging the importance of these critical updates for the cybersecurity enthusiasts, we bring forth the top headlines of the week:
From its website, the Department of Homeland Security’s (DHS) mission is “to secure the nation from the many threats we face.” In essence, the DHS’s job is to create trust, for Americans, in their own security. So, it shouldn’t come as any surprise that hackers would try to exploit that trust by launching an email
You wouldn’t put up a neon sign outside your home that says “rob this house” before you left for a week’s vacation. The last thing you want to do is give a crook a heads up. But that’s exactly what people unwittingly do when they post complaints about companies they do business within their social
By now, most people know that 91% of cyberattacks start with a phishing email. In recognition of this, companies are now beginning to offer security awareness training. According to an article on the website Dark Reading, “45% of organizations provide employees mandatory, formal cybersecurity training; another 10% give optional training.” The objective is simple: teach
If you’re doing business, then you’re sending, receiving and reading PDFs. PDFs have become ubiquitous in business as a way of sending documents over the web. And why not? There are a lot of advantages to using PDFs. For starters, it’s ubiquitous—everyone has a PDF reader. The files can include embedded links and images. The
The world transforms overnight, tables turn in a minute. Everything is always on the verge of taking a new form. Likewise, there are many developments taking place, daily, in the world of cybersecurity. As responsible adults, it is imperative that we keep ourselves updated on the happenings around the world, notably those about cybersecurity. Being
If you haven’t been paying attention, a lot of organizations have been hit by ransomware lately, almost all of which are triggered by a phishing email. Hackers use all types of exploits to extract money from their victims too. Their favorite, by far, is to encrypt the victim’s hard drive with a promise to decrypt
In cybersecurity, there’s a best practice called Defense in Depth. The idea behind Defense in Depth is very simple. Put up a bunch of different types of barriers instead of just relying on one. This way, no matter what attack vector the enemy chooses, you’re covered. Defense in depth is a pretty sound cybersecurity strategy,
Nothing remains static forever; after all, change is the only constant in the world! Naturally, this applies to the world of cyber security as well. Many developments take place in the digital world, especially in the field of Cybersecurity, daily. Since it is humanly impossible to keep track of all these changes, the least we
It sure is a good time to be in the phishing awareness training business, especially if you’re looking for investors to invest in your company. A couple of multimillion dollar deals were announced just last week. First, “start-up security awareness firm CybeReady has expanded into the U.S. market with an initial funding round of $5
I have to admit, what I’m about to share with you will save you a few bucks. There are a lot of ways to protect yourself from phishing attacks. There’s awareness training, endpoint security and real-time, cloud-based link scanning, to name a few. The problem with all of these is that they cost money. Not
Something as dynamic as the world of information or cyber security witnesses scores of activities every day. It is an ever raging battle between the attackers and the security providers. Keeping up with the numerous developments can be a daunting task, but for a cyber-security enthusiast, these updates become a necessity to be better prepared
Google is great. It offers a lot of useful services for free. And those services are tightly integrated so they work well together. Google services are also used by a lot of people. According to an article on Forbes.com, “Google’s Gmail email service is used by upwards of 1.5 billion people. The Google Calendar app,
Cybersecurity is a dynamic field of information and digital technology world and witnesses important events every single day of the year. These might either be the actions of hackers that are in the news or the anti-phishing or information security control measures adopted by the organizations trying to protect their information assets from those adversaries.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.