Join Our Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

Tech Insights

rss

Contributor Columns on Information Technology and Security

Beware of the B.E.C. scam, says a report at fbi.gov. The hackers target businesses and are good at getting what they want. The hackers first learn the name of a company’s CEO or other key figure such as the company’s lawyer or a vendor. They then figure out a way ...

Hackers and wannabe hackers can easily purchase cheap tools of the trade online. The security firm Dell SecureWorks Inc. confirms this in their latest report and adds that underground markets for hackers, including those from Russia, is thriving. The “Dark Web” is the go-to place for hackers looking for guidance ...

Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about the No. 1 ...

Stop clicking on e-mails about your package delivery! Scam, scam, scam! Look, it’s simple: Scammers are also pretending to be from the DHL and FedEx shipping companies, not just UPS. Crooks know that at any given time, thousands and thousands of U.S. people are waiting for a package delivery. ...

Last year, says the security firm Gemalto, over 700 million records were breached. Or, to put it another way, this translates to two million stolen or lost records every day. 2015 Breach Level Report 1,673 hacking incidents 398 were triggered from the inside of the attacked company: employees and even ...