Just when you thought you were safe, it seems cyber criminals are taking advantage of a vulnerability in Microsoft Powerpoint’s Object Linking Embedding (OLE)…
Employees
Social Media and Cyber Security: Risks from the Digital Social Sphere
Imagine this common scenario, an employee named John posts some politically charged content on his Twitter account and attracts the attention of many people…
The Rise of Remote Workers: Adopting Information Security to the New Future
The tides of reality are changing. Workers today search for a new lifestyle that takes them away from the brick and mortar office walls…
Two-Factor Bypass: Real Time Phishing and How to Protect Your Company
No way someone could steal your credentials right? Just to sign in to work you have to enter a password and a PIN. No…
Watering Hole Attacks: Cyber Threats Lying in Wait [Infographic]
Watering hole attacks is where cyber threats lie and wait. These threats grow daily and as a result it is best to be informed…
The Victim Click: The Psychology Behind Making Employees Click
We fall for them often. The crafty workings of phishing emails continues to find its way into companies through employees. Everyone - tiny, small…
How to Increase Cyber Security Efforts Without Hiring Additional Personnel
Information security attacks are happening non-stop, and data breaches seem commonplace now. Many organizations have attempted to staff their team with qualified cyber security…
The Decline of the Rogue Employee: Utilizing Behavioral Trends
When we hire employees, we never expect them to go rogue. A rogue employee is a worker that undermines their employer by not complying…