Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users. It happens when an attacker, posing as a trusted source, dupes a victim into clicking on a malicious link or downloading a spam file sent over email, text messages, phone calls or social media. If […]
It seems like I am creating a new account almost every day for websites, remote applications, programs, or services. And I am not sure about you, but I already have way too many passwords to keep track of. This problem leads to the largest risks people and organizations face with passwords, their selection, and storage. […]
We have all been shocked by developments in Ukraine in the last few days. Our thoughts and prayers are with the people caught up in the midst of this.
However, it would be remiss of us not to consider what impact the fallout has on our organizations. One of the potential impacts will come from cyberattacks against Western businesses, and this is the one that has taken up most of my thinking in the last couple of days.