Spear phishing is a highly-targeted, increasingly sophisticated attack that uses a combination of personally identifiable information (PII) and social engineering tactics to steal an organization’s money or data. Saying that… Continue reading Spear Phishing Attacks: Types, Elements, and Detection
role: Executive Leadership
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Business Email Compromise: Anatomy, Types, and Impact
Executive Takeaways An Overview of BEC Business Email Compromise (BEC) is a type of cyberattack that has grown in popularity recently, with attackers targeting businesses and organizations to steal money… Continue reading Business Email Compromise: Anatomy, Types, and Impact
Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Cyber crime isn’t automatically associated with violent criminal activity. That is, when we think of cyber criminal activity, we tend to think of hackers working anonymously behind computer screens to… Continue reading Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Expanding Doxing Risks & The Need for Privacy as a Service
In an increasingly political and divisive climate, doxing is a growing threat. It threatens, in particular, any person with increased exposure to sensitive and extremist groups online. These at-risk groups,… Continue reading Expanding Doxing Risks & The Need for Privacy as a Service
The Competitive Advantages of Employee Data Privacy
Executive Takeaways The Competitive Advantage of Prioritizing Data Privacy Exposed employee Personally Identifiable Information (PII) has led to more social engineering and spear phishing attacks on organizations. As such, organizations… Continue reading The Competitive Advantages of Employee Data Privacy
External PII Exposure Fuels Social Engineering, Data Breaches
Executive Takeaways Employee PII: An Easy-to-access, Effective Attack Vector External employee Personally Identifiable Information (PII) is a highly effective attack vector easily accessible to attackers. This PII is often used… Continue reading External PII Exposure Fuels Social Engineering, Data Breaches
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
The Executive’s Guide to Social Engineering and Spear Phishing
Executive Takeaways What is Social Engineering? Social engineering tricks people into doing something using manipulation. In the context of attacks on organizations, it is employed to gain access to sensitive information,… Continue reading The Executive’s Guide to Social Engineering and Spear Phishing
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk