Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of…
Tag: business
What to do when you discover a data breach
Your cell phone goes off in the middle of your well-deserved sleep and you try to find it before your partner…
Businesses: It’s time to implement an anti-phishing plan
Businesses: phishers aren’t just coming for you. They’re coming for your employees and your customers, too. Phishing attacks are on the…
Data scraping treasure trove found in the wild
We bring word of yet more data exposure, in the form of “nonsensitive” data scraping to the tune of 66m records…
6 security concerns to consider when automating your business
Automation is an increasingly-enticing option for businesses, especially when those in operations are in a perpetual cycle of “too much to…
How to create a sticky cybersecurity training program
Organizations know that training employees on cybersecurity and privacy are not only expensive but time-consuming. However, given that current threats are…
Bring your own security (BYOS): good idea or not?
We’ve talked about the concept of Bring Your Own Device, or BYOD, on the blog before. BYOD is a popular policy whereby…
White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime
This post was written by Michael Osterman of Osterman Research. Osterman Research recently completed a major survey on behalf of Malwarebytes…
4 steps for improving employee trust while securing them
Earlier this month we held our quarterly Cybercrime Tactics and Techniques Q2 2017 webinar. This event gave thousands of security practitioners…
How to secure your remote workers
Advances in networking and mobile technologies have enabled remote workforces on a global scale, whether that’s employing full-time staff members who…