If there were ever any honor among thieves, it clearly doesn’t apply to cyber crime. In the week after Easter, hackers stole almost $2 million from an Ohio church, a pillar in its community. The attackers used the same exploits as in the for-profit world and left the congregation
In our previous post, we discussed the losses for employees in a California school district from a single Phishing attack. We framed this as Step One in this attack - a breach harming school employees and their families. We’re now ready to explore Step Two in this attack through
In the midst of the Mueller report frenzy, an important story was largely missed. Florida is near and dear to us as an Orlando-based company, but this is a problem for America. The report noted that Russia’s GRU (Main Intelligence Directorate of the General Staff of the Russian Army)
With 90%+ of compromises originating from criminal Phishing campaigns, you need to know who is opening the door for attackers. Everyone knows the Internet can be a dangerous place. But attacks still happen every day of the year. Research shows that knowledge and intellect have no correlation with an employee
Remember your concerns when you were in school? Grades, appearance, coolness, location of the next party and all the other seemingly important things of life. None of these concerns relate to someone stealing your student loan funds or hacking (and releasing) your confidential files. Unfortunately this is a real risk
We’ve got a problem. Attackers are relentlessly focused on our SMB community - the lifeblood of this economy. To be sure, 62% of cyber attacks are against SMBs (data from Chubb). With a shocking data point like that, let’s dig in a bit more on the reasoning and
As if the restaurant business isn’t hard enough already… In 2015 and 2016, cyber criminals successfully attacked the POS systems of over a 1,000 franchised Wendy’s locations. The 3-year data breach saga came to an end last week, with Wendy’s entering into a $50 million settlement
Cyber criminals have figured out the value in targeting manufacturers. Using social engineering practices, these attackers exploit the imbedded trust within your organization and amongst your partners, vendors and clients. Once inside your organization, they can patiently plan subsequent moves to extract maximum value. To take these attacks from the