Your users are the weakest link in defending against cybercrime like phishing.They need to stay informed about the latest phishing threats and how to avoid becoming a victim to keep themselves and your organization safe.
Get the tools and information you need to stay one step ahead of the bad guys
Want to learn more about how phishing can affect you or your business? Here are the latest news articles:
Jason Koestenblatt at Enterprise Mobility Exchange wrote: "Thanks to the amount of time employees are spending online to get work done, hackers have a veritable treasure trove of opportunities and touch points to gain entry into an enterprise’s data and sensitive information. That’s why the number of breaches continues to grow each year, and one of the methods in which they’re accomplished is through phishing. In a new report released by PhishLabs, data from Q1 to Q2 in 2017 shows a staggering...Read More
So here’s a new one: a spoofed Amazon email claiming that Amazon has detected an unauthorized attempt to reset the password on the recipient’s account. A six digit code is provided along with instructions to call a phone number to “verify your identity.” A copy of this phish is above. A number of users online have reported receiving this phish over the past month. Some have even called the provided phone number. They report their calls being answered by individuals speaking with a thick...Read More
Our colleagues at Phishme released the results of their US Phishing Response Trends Report, which looked at the phishing response strategies of two hundred senior IT security decision-makers across a variety of large industries in the United States. The report shows that businesses are still the most worried about and least prepared for phishing attacks. In fact, most organizations feel they have little, if any, expertise in anti-phishing and many feel their phishing incident response processes...Read More
Here is the latest tactic in the cat-and-mouse game between cybercrime and security software vendors. The bad guys have come up with new a ransomware phishing attack, tricking users to open what appears to be a document scanned from an internal Konica Minolta C224e. This model is one of the most popular business scanner/printer in the world. The emails are written to make the user think that the communication is from a vendor. Basically, Locky is back with a vengeance and a whole new bag of...Read More
Threat Management Provider Risk IQ released data comparing the use of top 10 brands names in Phishing attacks from Q1 and Q2, 2017. The report doesn’t name the top ten brands favored by scammers other than they are “extremely well-known.” It does provide some insight into the metrics of phishing domain usage, number of phishing threats directed at potential victims through the use of top ten branding, together, with an analysis of domain information from the Whois database. Risk IQ provided the...Read More