In The News

It Is Time To Upgrade The Cybersecurity Tools Businesses Use Back during the Dot-com boom – or what many of us now refer to as the Dot-com bubble – of the mid '90s, many exciting advents were shaping the foundation of the modern web. In 1993, the Mosaic browser made the Internet accessible to everyday users by making data “pretty” with color and simple graphics. This advent, along with the growing popularity of the home Windows and Mac, spurred rapid adoption of Internet service Read full article.
Read More
INKY Protects Businesses From Phishing Attacks By Mixing Artificial Intelligence TL; DR: Using a unique blend of technologies, Inky’s Phish Fence mail protection gateway shields users from sophisticated phishing attacks. The program alerts users to emails disguised to look like they’ve been sent internally, and detects strange characters and sketchy links, sending users warnings so they’re educated about phishing attempts. The tool is easy to set up and allows administrators access to a dashboard that shows them the threats that exist in their organization Read full article.
Read More
How to stop spear-phishing cold Many hacks start with a spear-phishing attack, often aimed at the top of the corporate hierarchy. How do I hack thee? Let me count the ways. Among others, I hack thee to the depth and breadth and height of a spear-phishing attack (apologies to Elizabeth Barrett Browning). By now, you may be aware that many of the most devastating hacks that have occurred in recent history—the Democratic National Committee (DNC), Yahoo, the W-2 scam—have been launched from a base of information or access garnered by sending a poisoned email with tailored details to a specific individual, who then becomes the vector for the rest of the attack. Read full article.
Read More