<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Why Financial Institutions Are Phishing’s “Big Catch”

Posted by Jay Kelley on Aug 29, 2017

The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”  

Read More

Tags: financial services industry, cyberattacks, phishing, phishing attacks, phishing prevention, malware, ransomware, isolation, banking credentials, keyloggers, employee credential theft, credential theft, watering hole attacks, drive-by exploits, spear-phishing

Phishing & Whaling at FS-ISAC

Posted by Jay Kelley on May 22, 2017

Exhibiting at the recent FS-ISAC Annual Summit 2017 at the Dolphin Convention Center (which could have doubled as a meat locker at times because it was so cold, while other times it could have been a large sauna it was so hot and steamy!), there was a mini-monsoon outside at one point. It was like Mother Nature was mimicking the downpour of cyber attacks confronting the financial services players at the event. It was a deluge! 

Read More

Tags: FS-ISAC Annual Summit 2017, spear-phishing, cyber attacks, financial services, malware, ransomware, drive-by exploits, isolation, credential theft, cybersecurity

The (Human) Face of Ransomware

Posted by Jay Kelley on May 19, 2017

When you start to realize the scope and impact the ransomware attack that began on Friday, May 12, 2017, and continued to roll onward into last weekend had not only a huge negative effect on businesses and their operations, but on everyday people, it begins to become all too real.

Read More

Tags: wannacry, ransomware, cyber attacks, Telefonica, Vodafone, Gas Natural, phishing, spear-phishing, drive-by exploits, watering hole attacks, isolation

Reducing Risk by Eliminating the Phish

Posted by Greg Maudsley on Oct 4, 2016

 Recently, I’ve been speaking with a lot of CISOs, security industry veterans, and analysts about risk.

Read More

Tags: phishing, isolation, security, cybersecurity, malware, drive-by exploits, threats, ransomware, credential theft

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.