Category: Security Journey
-
Protecting your business AND doing good for your employees
Your cyber team might tell you that you should only worry about protecting your assets, and draw a hard line for personal devices. However, many businesses allow remote access via BYOD (bring your own device). So, if your employees are accessing email or IMs (Teams, Slack, etc.) on a personal device, you SHOULD care about Read more
-
Modern Phishing – Taking advantage of your trust
Cybercriminals are now copying the look, feel, and behavior of trusted technologies. Think Microsoft 365 login pages, Google Drive notifications, or even Zoom meeting invites to lure users into handing over sensitive information. These modern phishing techniques are disturbingly convincing, often indistinguishable from legitimate communications at first glance. In this blog, we’ll explore how attackers Read more
-
Business Email Compromise, now scarier with AI
“Write a professional email asking [COMPANY] to pay an invoice” With just this prompt against an ever-growing selection of free Large Language Model AIs, fraudsters and scammers can generate an email free from the typical spelling and grammar mistakes that modern cybersecurity awareness training teaches you to look for. Additionally through generative AI, they can Read more
