banner-blog.jpg

blog

Secure O365 and Secure G Suite for Your Enterprise

Posted by James Locus on Mar 9, 2020

Bad actors never rest

Creating legitimate-looking fake communications from Google or Microsoft is easy and inexpensive. Novice attackers with little or no coding experience can purchase phishing packs on the dark web that they can customize and then send emails to specific targets based on social engineering intelligence. Free and compromised accounts can also be used as an attack vector , hosting documents that contain malware or links to fake web forms or other malicious sites.

Read More

Tags: email attachments, email threats, malicious links, Isolation Core

How to Mitigate Phishing Threats inYour Organization

Posted by Kowsik Guruswamy on Dec 5, 2019

From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal information
to make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, like the ability to hover over a link to determine its destination, it is much easier for a user to make the simple mistake of clicking a bad link and falling victim to a phishing attempt. The popularity of social media has also made it much easier for hackers to find valid email addresses and research users’
life activities to create sophisticated, tailored phishing attacks.  From a security perspective, there are typically three approaches to solving the phishing problem – email security gateways, web proxies and security training awareness – but each has its own limitations.

Read More

Tags: phishing, email attachments, anti-phishing, phishing prevention, Google Docs email scam, email threats

Only 4 percent of users click on phishing emails. Yet those 4 percent never learn..

Posted by Mehul Patel on Apr 16, 2019

Working as a cybersecurity warrior has its perks. We’re on the front lines of an increasingly critical and dynamic battlefield, pitting increasingly sophisticated threats against increasingly sophisticated defenses. We’re doing important work, and it can be very rewarding.

Read More

Tags: email attachments, phishing training, phishing, malware, cyber attack, malicious links

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, cybersecurity, phishing, isolation, pdf, security, ransomware, risk, malicious code, malware vulnerabilities, cyber theft, security strategy, email attachments

Connect with us

Lists by Topic

see all

Recent Posts