Insider Threats – Your Employee May Be Your Greatest Risk
by Jake Dwares on June 12, 2023 at 10:30 AM
In February of 2018, Ashley Liles was working as an IT Security Analyst at an Oxford based company that suffered a ransomware attack. Ashley jumped at the opportunity, not to help the company, but to enrich himself by piggybacking on the initial ransomware attack and attempting to tri …
Vishing: Over-the-Phone Scamming
by Matthew Colson on June 8, 2023 at 5:00 PM
It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …
Different Types of Social Engineering Attacks Explained
by Diann Davids on June 2, 2023 at 9:30 AM
What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …
Tug-of-War: Balancing Security and Efficiency
by Justin Leach on May 26, 2023 at 11:00 AM
I find it helpful when explaining principles to think in extremes. So, when it comes to the principle of securing a system, what is the most secure? Let us use this computer I am typing on as an example. Off. That is the most secure. Let us even take the battery out, unplug everything …
Smishing: Text Messages from Scammers
by Bryan Borrayo on May 18, 2023 at 1:00 PM
Like most people, you have probably received a text message from a phone number that seemed a little “fishy”. The message may have claimed to be from your bank, asking you to verify your account information, or it may have promised you a gift card if you clicked on a provided link.
MIME Sniffing: What Is It? What Are the Security Implications?
by Geoff Yeagley on May 9, 2023 at 2:45 PM
Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …