by EdgeWave | Oct 26, 2017 | Cybercrime, Cybersecurity, Phishing |
Last week, in part 3 of our 4 part series, we asked you, as an IT professional, to evaluate if your users are careless or curious when clicking on random emails. Do they filter their Inbox and take caution when engaging with emails they receive, especially when it...
by EdgeWave | Oct 17, 2017 | Cybercrime, Cybersecurity, Phishing |
Last week, part 2 of our 4 part series, we discussed the limitations in combating Phishing when your IT team is resource constrained. But when suspicious emails make their way to your users’ inbox, are you confident in their response – are your users careless or...
by EdgeWave | Oct 10, 2017 | Cybercrime, Cybersecurity, Phishing |
Last week we shared some statistics about the impact Phishing emails have and some baseline recommendations a business can implement to minimize the effect on their organization. Phishing dwell time is the time an organization has exposure to a phishing attack and...
by EdgeWave | Oct 4, 2017 | Cybercrime, Cybersecurity, Phishing |
October is National Cyber Security Awareness Month and once again consumers and business professionals will read and hear stories from industry experts and vendors on the latest cybersecurity threats and what they can do to remain safe online. EdgeWave aligns with...
by Mike Walls | Nov 3, 2015 | Cybercrime, email security, Just plain interesting, Mike Walls, Outbound Threats, Phishing, Web Security |
3 Simple Rules to Avoid Being a Cyber Victim I think it was Walt Kelly, the famous cartoonist, who said “We have met the enemy and he is us.” How true that sentiment is when it comes to cyber security, and the Hackers know it. In spite of the diligent efforts of...
by Mike Walls | Sep 1, 2015 | Blended Threat, email security, Mike Walls, Military Grade, Phishing, Security Alerts |
This is Part 3 of a Series on how businesses can leverage proven US Military “Intelligent Adversary” tactics to stay cyber-secure. Part 2 discussed how how businesses could stay operational during a successful cyber attack. This week we will uncover who Red Team...