Skip to content
Data Privacy

Personal Data Privacy & Staying Safe on Social Media

Limiting the amount of immediately available information about you can not only help prevent you from becoming a target to hackers, but it can prevent other types of dangerous cybercrime, like doxing, identity theft, financial crime, and more. Data privacy is extremely important – being informed and aware is the first step to keeping your […]

Avoiding Malware from Deceptive Websites

Avoiding Malware from Deceptive Websites

Even the most careful internet users may come across malicious or deceptive websites without realizing it. With a momentary lapse of judgement, they could fall victim to a scam or download malware onto their machine. Here are some common types of malware that a deceptive website may infect your device with: Memory Dumpers: Malicious hidden […]

Social Media Phishing

Phishing: Outside the Inbox

“Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers…Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat (APT) event. In this latter scenario, employees are […]

Online Social Engineering

Social Engineering in Information Security

“Social engineering is the art of manipulating, influencing,or deceiving you in order to gain control over your computersystem. The hacker might use the phone, email, snail mail ordirect contact to gain illegal access.” KnowBe4 Phishing & other cybercrime isn’t just done through e-mail – in fact, a single cyber criminal may have several simultaneous attempts […]

Phishing Scam Security

Phishing Scam Techniques: Stop scammers dead in their tracks

You are not immune. Millions of people get their personal details stolen every day – 91% of cyberattacksand their resulting data breach begin with a spear phishing email. Once attackersdecide what information they intend to steal, which is usually personal or clientpayment information, they target everyone that has access to it. That means even ifyou […]

Sensitive Data

Handling sensitive data at work? Here’s some advice.

Employees that have access to sensitive data, or who’s devices could facilitate access to sensitive data storage, are constant targets of malicious entities that can directly profit from stealing that data. It’s important to identify what sensitive data you possessor have access to, and what kinds of data those entities are searching for. “According to […]