What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe Your phone buzzes. You hope it’s a reply from last night’s date,...
Month: October 2022
Launching a Vulnerability Management Program
Launching a Vulnerability Management ProgramLaunching a vulnerability management program requires a few methodical steps When President Biden’s executive order shone a light on the need to...
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity “I’ll just Uber home.” Who hails a taxi anymore? These days, city streets...
Optimize and secure your team’s Apple devices with Jamf Now
Optimize and secure your team’s Apple devices with Jamf NowLearn how Jamf Now’s features can streamline your company’s Apple mobile device management. The post Optimize and...
What Is Personally Identifiable Information (PII)?
What Is Personally Identifiable Information (PII)?Contenido de la entradaLeer másProofpoint News Feed
Digital Estate Planning – What to Do With Your Digital Assets
Digital Estate Planning – What to Do With Your Digital Assets While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles,...
Australian Insurer Medibank Confirms Ransomware Attack [Updated]
Australian Insurer Medibank Confirms Ransomware Attack [Updated]Medibank, a health insurance company providing services for more than 3.9 million people in Australia, recently confirmed that a ransomware...
What is Spyware?
What is Spyware? No one likes the feeling that someone is looking over their shoulder when they work, shop or surf online. But this is just...
True Security Requires a Holistic Approach
True Security Requires a Holistic Approach In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...
Parcel delivery scams are on the rise: Do you know what to watch out for?
Parcel delivery scams are on the rise: Do you know what to watch out for?As package delivery scams that spoof DHL, USPS and other delivery companies...
What We Have Learnt Building a Global Security Conscious Culture
What We Have Learnt Building a Global Security Conscious CultureBy Nicola McCoy, Chief Information Security Officer at RSM International The growing cyber risk is impacting global...
South Korean Android Users Targeted by Three New Malware Strains
South Korean Android Users Targeted by Three New Malware StrainsThe North Korean cyberespionage group known as Kimsuky has been observed exploiting three different Android malware targeted...
Cybercriminals Continue to Set Their Sights on Hospitality
Cybercriminals Continue to Set Their Sights on HospitalityContenido de la entradaLeer másProofpoint News Feed
Get practice materials for 14 top certification exams for just $20
Get practice materials for 14 top certification exams for just $20Cover CompTIA, AWS and much more with The 2022 CompTIA & AWS Practice Exam E-Book Bundle....
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself Automobile manufacturer Toyota recently announced a data breach that may have exposed...
New Malicious Clicker found in apps installed by 20M+ users
New Malicious Clicker found in apps installed by 20M+ users Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported,...
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled PublicationContenido de la entradaLeer másCisco Event Responses
Massive Freejacking Campaign Abuses Cloud Dev Resources
Massive Freejacking Campaign Abuses Cloud Dev ResourcesA large-scale freejacking campaign is abusing GitHub, Heroku, and Buddy services to mine cryptocurrency at the expense of the provider....
“This Connection Is Not Private” – What it Means and How to Protect Your Privacy
“This Connection Is Not Private” – What it Means and How to Protect Your Privacy Have you ever been browsing online and clicked a link or...
How to Tell Whether a Website Is Safe or Unsafe
How to Tell Whether a Website Is Safe or Unsafe It’s important to know that not all websites are safe to visit. In fact, some sites...
Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned API
Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned APIJust over 3 years ago now, I sat down at a makeshift desk (ok,...
The not-so-Charming Kitten working for Iran
The not-so-Charming Kitten working for IranContenido de la entradaLeer másProofpoint News Feed
The U.K. Company Interserve Fined for Lack of Cybersecurity Measures
The U.K. Company Interserve Fined for Lack of Cybersecurity MeasuresConstruction group Interserve was fined by the UK’s Information Commissioner’s Office (ICO) after a cyberattack that happened...
Guide: Protecting Your Digital Identity
Guide: Protecting Your Digital Identity People in their 20s and 30s are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest...
Secure corporate emails with intent-based BEC detection
Secure corporate emails with intent-based BEC detectionBusiness email compromise is a severe threat that might affect any company. One promising way to improve detection on this...
What Are Tailgating Attacks and How to Protect Yourself From Them
What Are Tailgating Attacks and How to Protect Yourself From Them Whether you’re spending time on the web or working in the office, you want peace...
What Is Smishing and Vishing, and How Do You Protect Yourself
What Is Smishing and Vishing, and How Do You Protect Yourself Smishing and vishing are scams where criminals attempt to get users to click a fraudulent...
How to Spot Fake Login Pages
How to Spot Fake Login Pages Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the...
Top Signs of Identity Theft
Top Signs of Identity Theft When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a problem. A missing bill or a mysterious charge on your...
Protect yourself from scams this Diwali
Protect yourself from scams this Diwali It’s Diwali, a time of light, a time of togetherness, and, of course, a time of celebration. Along with Diwali...


























