Business Email Compromise (BEC) is one of the most financially damaging online crimes. In 2022, Business Email Compromise (BEC) was the second largest category of losses across all reported cybercrimes, with a collective $2.7 Billion in attributed financial loss. Since its inception, the IC3’s Recovery Asset Team has assisted private financial institutions with freezing more...Read More
The Guide to Risk Management and Cybersecurity Assessments The idea of understanding your cybersecurity risks, program, threats, and potential impacts seems like an obvious item on a business leader’s to-do list — yet often only done when a firm needs to “check a box” for compliance purposes. A proper assessment and analysis is the first...Read More
In 1996, a Microsoft employee used the first Virtual Private Network (VPN) to provide a secure connection to the Internet — which later was adapted into a popular method for remotely connecting with private corporate networks by the 2000s. Obviously, a lot has changed since then in terms of IT environments and infrastructure — that...Read More
Florida state agencies and local governments are now subject to new cybersecurity requirements and prohibitions that went into effect on July 1, 2022. These new amendments to Florida’s State Cybersecurity Act (“the Cybersecurity Act”) impose practically impossible-to-meet notification requirements on state and local governmental entities and prohibit them from making ransom payments. Stepping back to...Read More
Keep this in mind as we start the 2022 Windows software patching year: Patching is not enough to keep Microsoft 365 protected. Before you purchase third-party tools that claim to protect you from all threats, or before you begin that zero-trust project, stop for a moment to evaluate whether you are doing all you can...Read More
Following these consumer security best practices for online shopping will help you get through the holiday season securely as well as avoid shopping scams, prevent theft of your personal data, and secure your credit card information. Kate, a mother of three, couldn’t contain her excitement for shopping during the holiday season when she received an...Read More
As we continue our journey with NIST, Here we show you what it means to “protect” while providing our readers with industry best practices towards your security program. A cybersecurity program’s “Protect” function is often the most thought-about area that organizations consider when looking to enhance their security program. It’s also the second of five...Read More
Each year on January 28, an international initiative known as Data Privacy Day serves to remind us of the importance of data privacy and the protection of personal information. The goal of Data Privacy Day 2021 is to empower consumers to Own Your Privacy and businesses to Respect Privacy. It Takes Two to Protect Data Privacy Protecting the privacy and...Read More
From ransomware schemes to supply chain attacks, this year melded classic hacks with extraordinary circumstances WHAT A WAY to kick off a new decade. 2020 showcased all of the digital risks and cybersecurity woes you’ve come to expect in the modern era, but this year was unique in the ways Covid-19 radically and tragically transformed life around the...Read More
Written by Stu Sjouerman Scamming incidents have increased by 519% in 2020 compared to last year, according to researchers at Baltimore-based ZeroFOX. The researchers compared their own data to a recent report from the Federal Trade Commission, which found that scams on social media have skyrocketed since the start of the pandemic earlier this year....Read More