View Post

How To Avoid Being the Victim of a SMiShing Attack

In Security by Alex PattersonLeave a Comment

SMiShing is not a new tactic. A form of phishing, SMiShing is an activity that involves someone attempting to trick you via text or SMS message. If the trick is successful, the individual will receive your critical personal information. Did you know that there are approximately 913,242,000 texts sent every hour of every single day around the globe? This translates …

View Post

Are You PhishProof?

In Security by Alex PattersonLeave a Comment

Phishing is one of the most common forms of cybercrime, so if you’re online, you’ve likely been targeted by a phishing attack—and you might not even know it. So what is phishing exactly? It’s the act of collecting personal information—including bank account numbers, passwords, and usernames—through electronic means, such as deceptive email messages and phone calls. According to RSA’s report …

View Post

How to Identify a Phish and How to Protect Against Phishing

In Security by Shelly KramerLeave a Comment

Holiday season means phishing season, and that’s not the good kind of fishing that you do while you’re relaxing out on the lake—it’s the cybersecurity nightmare kind of phishing and it poses big risks for businesses of all sizes. My guest on the Converge TechTalk show today is Mison Riggins from Inspired eLearning and we’re talking about cybersecurity and the …

View Post

Instagram Phishing: How to Prevent It and What to Do If It Happens to You

In Security by Patricia EvansLeave a Comment

Phishing is the most popular way to hack Instagram accounts, because, according to the hackers themselves, it’s the easiest! Instagram Phishers simply create a fake login page that looks just like the one on the “real” Instagram. Hackers create this spoofed login page through fake apps promising to help manage Instagram users’ accounts and use free hosting and paid accounts …

View Post

5 Reasons DevOps and Security Need to Work Together

In Security by Daniel NewmanLeave a Comment

There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are …

View Post

How to Create an Effective Business Continuity and DR Plan

In Security by Toby OwenLeave a Comment

We rarely get a warning when disaster is about to strike, be it a natural disaster or a cyberattack. Your best chance at detecting, containing and responding to a disaster of any kind is through a tested and proven plan. An effective business continuity plan and DR Plan provides detailed instructions before, during and after disaster strikes—and can make or …

View Post

CyberSecurity—The Greatest Challenge CISOs Face Today

In Security by Shelly KramerLeave a Comment

What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …

View Post

Here’s How to Kickstart Your Data Protection Strategy

In Security by Toby OwenLeave a Comment

Many business leaders associate data protection with cyberattacks. Mainly, due to the alarming news stories that continue to surface—from the WannaCry ransomware attack that spread across 150 countries to Equifax’s massive breach that affected as many as 147.9 million consumers. Luckily, media coverage for these incidents has spurred much-needed awareness for data security.  However, cyberattacks are just one concern when it …

View Post

Top Takeaways from 2018 Verizon Data Breach Investigation [Report]

In Security by Carolina Curby-LucierLeave a Comment

As the number of threats and security breaches continue to grow, protecting your business from a cyber-attack takes a conscientious and sustained effort. Cybercriminals are expanding their forces and the assaults are becoming more sophisticated every day. If you aren’t fully engaged in your cyber security efforts you could be vulnerable. Do you know the biggest threats to your cyber …