How Someone Else Getting Phished Can Cost You Your Life

How Someone Else Getting Phished Can Cost You Your Life

When it comes to phishing attacks, you probably don’t give it a second thought when someone else gets phished. But maybe you should. According to a new article on the Help Net Security website, “Cybersecurity threats are a rising problem in society, especially for healthcare organizations. Successful attacks can jeopardize not only patient data, but

View Full Post
Phish Protection at CloudFest

Phish Protection at CloudFest

Meet the Phish Protection Team at CloudFest It’s happening in Rust, Germany, and we want you to be there!   CloudFest 2019 is where cloud and hosting professionals to join together to explore and challenge the future of internet technology. Guaranteeing an electrifying experience for all, attendees can expect to hear compelling keynote speakers, attend

View Full Post
Phishing in the News

Phishing in the News

2018’s Primary Breach Actors Were Malicious Outsiders According to a Whitepaper by security firm Tripwire, “2018’s primary breach actors were malicious outsiders. They were behind 56 percent of all breaches, followed by accidental loss at 34 per­cent, malicious insiders at 7 percent, hacktivists at 2 percent, and the remain­ing 1 percent falling into unknown.”

Recovering from a Phishing Attack

Recovering from a Phishing Attack

So you tried your best to avoid a phishing attack but one day your laptop woke up with the flu bug. Criminals use phishing attacks to try to get at your personal information. You receive a legitimate-looking email with a link or attachment attached and you take the bait. After the initial shock wears off

View Full Post
Combating the Threat of Phishing in the Modern Corporation

Combating the Threat of Phishing in the Modern Corporation

Phishing is possibly the single most dangerous form of cyber attack facing individuals and corporations in today’s world because it exploits people rather than systems. At a very high level, phishing is any form of attack that trades on the trust of a person or corporation to reveal some information they wouldn’t normally reveal.

Do I Need Third-Party Phishing Protection for Office 365?

Do I Need Third-Party Phishing Protection for Office 365?

Office 365’s security features won’t protect users from all cyber security threats.   Microsoft’s cloud-based Office 365 user base is growing at a steady rate. Since the office platform first outperformed Google Apps in 2015, it’s seen a constant uptick in activity. Now, Microsoft reports it counts its Office 365 users in the hundreds of millions. However,

View Full Post
Can Phishing Awareness Training Cause More Harm Than Good?

Can Phishing Awareness Training Cause More Harm Than Good?

Filtering and time-of-click protection can produce results where training fails. First, the facts: Employees who are unaware of the dangers of phishing are far more likely to become victims of phishing attempts than those who understand the process. The FBI estimates that organizations across the United States lose $1.2 billion every year due to email

View Full Post
Phishing Attack Mechanics: How Cybercrime Strategy Works

Phishing Attack Mechanics: How Cybercrime Strategy Works

Phishing attacks follow five key steps. Effective cybersecurity prevents them at each one. “I’d never fall for that.” “It’ll never happen to me.” “They’re not interested in companies like ours.” Almost every cybercrime victim has said words like these at one time or another. Anyone who believes that they, their company, or their colleagues are

View Full Post
The Top 5 Phishing Scams in History – What You Need to Know

The Top 5 Phishing Scams in History – What You Need to Know

Learn how to protect yourself by studying the biggest phishing scams in history If we draw an analogy between phishing and fishing, some scam artists are industrial-sized trawling operations that scrape the sea clean. Automated software and sophisticated tools make it possible for enterprising cybercriminals to scale their fraudulent emails in ways never imagined. Processes

View Full Post