What Were BullPhish ID’s Top Phishing Scams of 2020?

What were the top phishing scams of 2020 that users fell for in phishing simulations? See the new data & why you need to do more training.
The post What Were BullPhish ID’s Top Phishing Scams of 2020? appeared first on Security Boulevard.
Continue reading What Were BullPhish ID’s Top Phishing Scams of 2020?

How Are Cybercriminals Stealing Business Data?

How are cybercriminals stealing business data? Very easily using tools like ransomware. Does that put your business at risk? Yes. Here’s how to mitigate it quickly and affordably.
The post How Are Cybercriminals Stealing Business Data? appeared first o… Continue reading How Are Cybercriminals Stealing Business Data?

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks and systems. A simple phishing or c… Continue reading From Stolen Credentials to Full Network Compromise

How SMBs Can Mitigate the Growing Risk of File-based Attacks

Cases of document-based malware are steadily rising. 59 percent of all malicious files detected in the first quarter of 2019 were contained in documents.

Due to how work is done in today’s offices and workplaces, companies are among those commonly aff… Continue reading How SMBs Can Mitigate the Growing Risk of File-based Attacks

How SMBs Can Mitigate the Growing Risk of File-based Attacks

Cases of document-based malware are steadily rising. 59 percent of all malicious files detected in the first quarter of 2019 were contained in documents.

Due to how work is done in today’s offices and workplaces, companies are among those commonly aff… Continue reading How SMBs Can Mitigate the Growing Risk of File-based Attacks