Category: Uncategorized

  • Blog
  • Category: Uncategorized
Clone Phishing Attacks

Clone Phishing Attacks

Share 0 Tweet 0 Share 0 Cyber criminals are constantly evolving their attacks and tweaking methods that work.One phishing attack method that attackers have recently been using is clone phishing.It is effective!When we use this attack on social engineering engagements, we typically get a 50% click rate.What is clone phishing?Clone phishing is a type of phishing

Read More
Small Business Network Security

Small Business Network Security

Share 0 Tweet 0 Share 0 Today, I’m going to show you a complete small business network security checklist.In fact, this checklist is one of the main reasons that our customers are able to stop attackers before they do damage to their organizations.So, if you’re looking for an effective way to secure your computer network,

Read More
Phishing vs Spear Phishing: What’s The Difference? (Plain English)

Phishing vs Spear Phishing: What’s The Difference? (Plain English)

Share 0 Tweet 0 Share 0 Everywhere you turn, you are probably hearing about phishing attacks.According to research by KnowBe4, 70% to 90% of breaches today involve phishing.But do you know a phishing method that is highly effective?Spear phishing.Let’s discuss the difference between phishing and spear phishing and how you can protect your business from each.Ready?Before

Read More
Does encryption prevent ransomware

Does encryption prevent ransomware

Share 0 Tweet 0 Share 0 Ransomware attacks have been increasing for the last few years.And there are lots of questions about ways to prevent ransomware.Today, we want to answer one of these:Does encryption prevent ransomware?Can ransomware encrypt an encrypted drive?Even if you have encrypted your hard drives, ransomware can still encrypt (re-encrypt them). Encrypting

Read More