<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

How does a phishing email work?

Posted by Keith Shaffer Aug 21, 2019 2:09:00 PM

Phishing is a type of social engineering attack that is designed to steal user data like login information or any credit card information on the user's computer. Phishing is subtle because the attacker can gain your information from a simple action like opening a phishing email, replying or clicking on a link on the phishing email. When a user does any of these actions, a malicious software can be installed on the computer or the system can be frozen as part of a ransomware attack.

Read More

Topics: Phishing, Malicious Software, Hacked

Should My Business Be Worried About Ransomware?

Posted by Keith Shaffer Aug 9, 2019 1:53:51 PM

71 % of ransomware attacks in 2018 targeted small to medium-sized U.S. businesses.

Read More

Topics: Cyber Security, Phishing, Data Protection, Ransomware, Website

How Law Firms Can Identify a Phishing Email

Posted by Keith Shaffer Jan 25, 2019 12:49:20 PM

Experian has released its sixth annual Data Breach Industry Forecast, which highlights six key areas where companies and individuals should be aware of possible data breaches. It also singled out lawyers as specifically being easy prey to biometric, cloud and phishing cyber attacks.

The recent news of Marriott’s data breach and other headline-grabbing events show how lawyers are counseling their clients through massive data breaches. But the cyber attacks should also remind lawyers and their firms to safeguard their own technology.

Source: Legaltech News

According to The American Bar Association 2017 Security Report

"Some attorneys and law firms may not be devoting more attention and resources to security because they mistakenly believe it won’t happen to them. The increasing threats to attorneys and law firms and the reports of security breaches should dispel this mistaken viewpoint. Significantly, 22% of respondents overall reported that their firm had experienced a data breach at some time—up from 14% last year. Reports of breaches ranged from a high for firms with 10-49 attorneys (35%, more than one-third) to a low of 10% for solos."

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is a an attack via e-mail, that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

 

Phishing Email Cybersecurity Training Fairdinkum
Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Phishing

5 Ways to Protect Your Business from Social Media Phishing

Posted by Keith Shaffer Oct 20, 2018 1:31:00 PM

Phishing is the practice of imitating a company to obtain sensitive information. This information might include credit card details for the purposes of defrauding customers, for example, or employee passwords in order to gain unauthorized access to company data.

Read More

Topics: Cyber Security, Phishing

How to Identify a Phishing Email

Posted by Gabrielle D'Andrea Jun 5, 2018 10:00:00 AM

Before you open that very legitimate-looking email, I just want you to pause a second. If you don’t know already, phishing is an attack via e-mail that aims to gather your personal information. Whether it be passwords, account numbers, pins or social security numbers– you do not want that information in the wrong hands. The goal of this email is to look legitimate enough that you don’t see any concern in opening it. Over the years, people have become more savvy in spotting suspicious emails, but as we get smarter, so do hackers.

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Phishing