A Big Part of the Phishing Problem is You

A Big Part of the Phishing Problem is You

The days of a hacker sitting alone at their computer screen in a dark room probing for network vulnerabilities is a thing of the past. That’s too much work. To penetrate networks today, hackers almost always enlist the help of an inside accomplice: you. What hackers have discovered over the years is that it’s much

View Full Post
The Privacy Tool Used to Phish You

The Privacy Tool Used to Phish You

With email security, it’s a never ending cycle of attacks and counterattacks. Whenever the bad guys come up with some clever new way to scam people, the good guys eventually figure out a way to combat it. If only that were the end of the story. Unfortunately, it really is a never ending cycle. So,

View Full Post
What to do If You’re Hit by Ransomware – Part 2

What to do If You’re Hit by Ransomware – Part 2

As we mentioned in Part 1, when it comes to dealing with ransomware, you basically have three choices: pay it, don’t pay it or avoid it in the first place by deploying anti-phishing software. Naturally, here at Phish Protection we think you should be proactive and use our inexpensive and easy-to-deploy cloud-based phishing protection with

View Full Post
Protection From Phishing: A Growing Threat In Today’s Information Age

Protection From Phishing: A Growing Threat In Today’s Information Age

The rapid transformation of the cyberspace and digital technologies in recent times have necessitated changes in an enterprise’s digital architecture. Adversaries these days make use of highly sophisticated techniques and advanced digital platforms to attack enterprises and individuals. One of these techniques employed by cybercriminals is ‘Phishing.’ Phishing is a type of online fraud, which

View Full Post
What to do If You’re Hit by Ransomware

What to do If You’re Hit by Ransomware

There’s much debate going on today about what to do if your organization gets hit by ransomware. There’s really only two choices: pay it or don’t. And which side you come down on says a lot about your big picture perspective. Recently, U.S. Mayors, at their yearly conference, which represents over 1,400 mayors from U.S.

View Full Post
This Fall Season, Beware of Phishing Attacks

This Fall Season, Beware of Phishing Attacks

As the holiday season approaches and shoppers plan to spend more on online purchases buying toys, gifts, clothes, etc. for the loved ones, the Cyber criminals become more active during this time of the season trying to lure the online buyers into stealing their banking and credit card information. According to various reports published, October

View Full Post
How Using Anti-Phishing Email Templates to Train Your Employees Can Help Avoid Phishing Attacks

How Using Anti-Phishing Email Templates to Train Your Employees Can Help Avoid Phishing Attacks

Phishing is among the most common types of cyber-attacks that take place these days and is preferred by cyber-criminals for stealing sensitive and confidential user data. Such data may include valuable personal information such as login credentials, credit card details etc. which can cause severe personal or financial damage if it falls in the wrong

View Full Post
Latest Phishing Vulnerability Confirms Awareness Training is Insufficient

Latest Phishing Vulnerability Confirms Awareness Training is Insufficient

Phishing prevention that primarily depends on awareness training is doomed to fail. That’s the implication of the latest research conducted at Ruhr University Bochum and Münster University of Applied Sciences A team of researchers discovered several vulnerabilities in two technologies used for email authentication and verification: OpenPGP and S/MIME. The vulnerabilities could allow attackers to

View Full Post
When it Comes to Getting Phished, Game of Thrones is no Fantasy

When it Comes to Getting Phished, Game of Thrones is no Fantasy

Phish protection technology is needed more than ever for fans of the wildly popular TV show Game of Thrones. Scammers are out there with official-looking websites trying to steal everything from personal information to credit card numbers. According to Checkpoint Research, “The fraudulent websites exploit the popularity of the brand to display ads,