Social Engineering

Blue and white logo new
Multi-factor authentication Phishing Social Engineering Spear Phishing

Maximizing Security Awareness: Defending Against Social Engineering Attacks

In today’s digital landscape, security threats are omnipresent. Systems are no longer the sole targets; attackers are increasingly focusing on employees. Modern technical controls, when correctly configured, are hi...

PLC-Ransomware
Malware Manufacturing Penetration Testing Phishing Ransomware Social Engineering

NEW PLC HACKING THREAT

How it’s Happening and Five Steps to Take to Protect Your Network When most people think of cutting edge cryptomining, they don’t think of using PLCs (Programmable Logic Controllers). Apparently criminal hackers and c...

Safe Systems Blog Image
Chief Information Security Officer Information Security Phishing Social Engineering

Why Security Solutions Fail and What Your Financial Institution Can Do to Stay Safe

Originally written as a guest post for our partner, Safe Systems (www.safesystems.com) From the beginning of the pandemic, the financial sector has seen a rising number of security threats. With more employees working...

Coronavirus Malware Phishing Ransomware Social Engineering

Coronavirus – Cybersecurity Tough Love from Chris Roberts!

Let’s get real for a minute – like Chris Roberts real.  If you don’t know or know of Chris and you work in cybersecurity or information security, he is a good follow.  His posts are always on point, relevant, a...

Information Security Penetration Testing Phishing Registered Investment Advisor RIA Social Engineering Vulnerability Assessments

Registered Investment Advisors (RIA’s) – It’s time to invest in Cybersecurity!

This week, Ryan Neal wrote a piece for WealthManagement.com about how Registered Investment Advisors (RIA) need to step up their game when it comes to taking cybersecurity requirements seriously. Below is a quote, taken ...

Phishing Social Engineering

MYTH: Phishing Tests Should Only Be Performed Annually

Here we go again – this is the third in our series of posts for National Cyber Security Awareness Month (NCSAM).  During the month, we are looking to dispel cyber security related myths that we hear all too frequen...

Phishing Social Engineering

Phishing Attacks – Do’s and Don’ts to Protect Your Company

In Today’s world, a phishing attack is one of the most successful means a hacker uses to gain access to your data.  It’s not all that shocking given the improvements in technology, tools and education regardi...