by Ron Samson | | Network Security, Threat Insight
The Insider Threat: How To Mitigate The Top Three Human Risks To Your Company’s Information Systems. We lock our systems and networks down, we install the latest and greatest Intrusion Detection/Prevention Systems (IDS/ IPS), and we have the best physical security at...
by Ron Samson | | Network Security, Threat Insight
Why do I need a Vulnerability Assessment and Remediation Plan? Look, we know what you’re thinking: “We have never been hacked to my knowledge, why would I need a cybersecurity assessment and remediation program, or plan?” To keep your business safe, and in line with...
by Ron Samson | | Threat Insight
What is spear phishing? Spear phishing is a targeted attack delivered via email – commonly using some piece of information like the recipients name, their bank, a company they work with etc. People are much more likely to fall for these type of attacks than...
by Ron Samson | | Threat Insight
What is a malicious attachment? Malicious attachments typically come along with phishing emails. They may come in the form of a fake invoice, or word doc and contain threats like ransomware, malware, keyloggers and other threats. How do I identify a malicious email...
by Ron Samson | | Threat Insight
What is a malicious URL? A malicious URL is a link created with the purpose of promoting scams, attacks, and frauds. When clicked on, malicious URLs can download ransomware, lead to phishing or spearphishing emails, or cause other forms of cybercrime. Malicious URLs...
by Ron Samson | | Threat Insight
What is phishing? Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices. What types of phishing are there? Spear phishing –...