Common social engineering scams and how to avoid them

A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, or infect your systems is by simply tricking […]

Insider Threat: 3 Ways to Mitigate Risk

An insider threat is a security risk that originates from within the targeted organization. Anyone with access to sensitive information can become a threat to the organization, intentionally or unintentionally. Insider threat comes in many forms – it could be a current well-meaning employee who is negligent or unaware, or a disgruntled current or former […]