
Cyber Criminals Know Your Users Better Than You A shift is observed in the strategy of cyber attackers. The change is away from the enterprise perimeter and endpoints, and moving toward employees and key functional roles. Cyber Security Hub hosted a webinar with Proofpoint to discuss how your organization can stay one step ahead of […]

Mobile Devices Demand Executive Diligence Mobile devices demand diligence at the CISO level. In fact, like the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. One of the understated risks is that the mobile breach could allow for expansive lateral movement. Cyber Security Hub developed a market report to […]

The really unfortunate situation faced by organizations today is that legacy email security solutions are being outpaced by a rapidly-changing threat landscape and a steep rise in targeted attacks. Email security isn’t foolproof either. And the solutions that organizations have deployed are no longer keeping up with the sophistication of attackers. The Not-So-Sincere Bakery Order […]

Email is the single most effective and commonplace way of reaching someone in the business world today. Even as other methods of digital communication have come and gone over its 40-year history, email remains the backbone of business communications with 3.7 billion users worldwide collectively sending 269 billion messages every day. But email’s ubiquity and […]

A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are available or even […]

A new report by email and data security company Mimecast has revealed a staggering increase in the number of Business Email Compromise (BEC) cyber-attacks. The quarterly Email Security Risk Assessment (ESRA) report, released today, found a 269% increase in the number of BEC attacks in quarter three of 2019, compared to the second quarter of the year. BEC attacks are […]
Do you have in place an email policy that is clear, comprehensive, and current? In other words, has your email policy been reviewed and updated within the past 12 months? ____Yes ____No ____Don ‘t Know 2. Have you created an email retention policy to govern the retention and disposition of electronic business records and help […]
The way it’s commonly used, email is a non-confirming message delivery protocol. This means that there is no guarantee that any given email sent from you will be delivered to its intended recipients. Delivery is based on assumption and acceptance by the relay server to complete the function. Additionally, once the relay server has accepted […]
Cloud computing has already made a huge impact on the IT industry. Being in the market for more than a decade, its true capabilities are only now beginning to be realized. Among the various services and platforms, Software as a Service (SaaS) is one of the most preferred among enterprises. Dominate the IT market with […]
Spoofing and phishing, the practice in which criminals send e-mails masquerading as a trusted source in order to obtain users’ credentials or install malware on the victim’s computer, has long been a problem that has plagued financial institutions, the healthcare industry, law firms and others. The concept is simple: an e-mail is sent that appears […]