<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: cyber security, phishing attack, browser isolation, hacked, hackers, isolation technology

Don’t Let Phishing Ruin Your Trip

Posted by Jay Kelley on May 10, 2017

Traveling on business, you check into a business-friendly hotel for a few days. You approach the front desk of the hotel, checking in after a long flight. But, the front desk staff is, unfortunately, unable to check you in because the hotel’s electronic key system has been hacked. Someone on the hotel’s staff opened an email from an unknown party, clicked on an unknown link, and malware has infected the electronic key system. So, until ransom is paid, keys cannot be issued. Would you ever stay at that hotel again? Probably not. 

Read More

Tags: anti-phishing, hospitality, hacked, ransomware, spear-phishing, isolation, read-only mode

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.