Your Team’s New Sport, Catching Phish

The good. The bad. The ugly.  Pretty much describes your inbox, doesn't it?

What's tough is sometimes you can't tell which are which. Is the email coupon from Round Table (20% off the Hearty Bacon Supreme!) good, or an ugly phishing attempt?

Is the notice from Netflix that your account needs renewing just one of those bad emails that wants your money for services, or is it an ugly attempt to just take your money?

If you had the Catch Phish Email Analysis icon in your email menu, you wouldn't have to wonder.

Hackers Love a Crisis!

The adage "never let a good crisis go to waste" applies to hackers everywhere. And the Coronavirus is the perfect crisis to exploit.

Sophos, one of Adept's security vendors, reports on one Coronavirus scam. They explain, "The fake page consists of the official, current home page of the World Health Organisation (WHO), with an unassuming popup form on top of it.

Fileless malware: The guileful threat

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays to stay abreast of such […]

Autocomplete password risks

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion […]

Protect your VoIP system from phishers

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed […]

Why you need a VPN and how to choose one

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is a VPN? The best way to describe […]

How to protect your company mobile devices

Businesses have embraced mobile technology, as it allows for constant collaboration, which increases productivity. But as the number of mobile devices used in daily operations grows, so do the incidents of cybercrimes targeting smartphones and tablets. Protect your company mobile devices by following these steps. Ensure mobile OS is up-to-date The updates on Apple and […]