KnowBe4, has released the new Phishing by Industry Benchmarking Report to measure an organization’s average Phish-prone percentage, which indicates how many of their employees are likely to fall for a phishing or social engineering scam. The 2019 study analyzed a data set of nearly nine million users across 18,000 organizations with over 20 million simulated […]
This Is How Much Time and Money a DDoS Attack Will Cost You
This Is How Much Time and Money a DDoS Attack Will Cost You You don’t have to look at any statistics to know that DDoS attacks aren’t just inconvenient. They can also cost your organization valuable time and money. But just how much time and money? That’s what we’re here to show you with help […]
Why Do Organizations Still Under-report Cybercrime?
It’s estimated that organizations aren’t engaging with Law Enforcement when becoming a victim of a cybercrime in large numbers. We cover 5 reasons why organizations don’t. After a confirmed cyberattack, there are a number of tasks that need to be done; figure out what happened, assess the scope of any damage done, figure out where […]
Phishing Campaign Impersonates Email Alerts From DHS
An ongoing email-based phishing scam is attempting to fool recipients into opening malicious attachments disguised as notifications from the U.S. Department of Homeland Security (DHS), according to the Cybersecurity and Infrastructure Security Agency, in a warning posted on the official US-CERT web site this past Tuesday. “The email campaign uses a spoofed email address to […]
“File Deletion” Alert Becomes the Latest Scam to Compromise Office 365 Credentials
Attackers use simple cause for concern as the basis of a scam intent on tricking victims into offering up their Office 365 credentials. A very official-looking email is making the rounds, taking advantage of the approximately 50% of companies today using Office 365. And it’s not surprising, as Microsoft is the most impersonated brand in […]
Mobile Device Manager Plus is here to make your service desk more efficient
On an average day, help desk technicians battle against forgotten passwords, never-ending updates, and misplaced devices. This incessant inflow of mundane tickets can allow business-critical issues to slip under technicians’ radar. What if there was a solution to reduce the effort spent on these routine tickets, and allow help desk technicians to spend more time […]
Microsoft Patch Tuesday June 2019: 88 vulnerabilities to fix, but how?
Every Patch Tuesday is a nightmare for IT admins, loading them with a bundle of updates, leaving them no respite for the rest of the week. This June Patch Tuesday is no exception, with a huge amount of patches released to address 88 vulnerabilities in supported Windows operating systems and related applications. Of these updates, […]
Getting Wired for Wireless: Future-Proofing
Future-proofing switching infrastructure is another important consideration in preparing for the deployment of Wi-Fi 6 wireless access points (APs). Examples include the ability to scale, easily upgrade existing switches, and the flexibility to modify, reconfigure, and repurpose existing hardware. These capabilities, if properly considered, can help protect investment and extend the useful life of customer […]
Top Seven DDoS Protection Challenges
Although there are now more DDoS protection solutions available than ever before, companies still tend to face a few major hurdles with DDoS defense. From attack complexity to a lack of granular control, the challenges that organizations are up against are as varied as they are difficult. Here, we’ll look at the top-seven DDoS protection […]
Extortion Threatens Reputational Damage
Scammers are sending emails threatening to damage the reputation of websites unless the sites’ owners hand over 0.3 bitcoin, or around $2,400, according to BleepingComputer. The attackers say that they’ll send out billions of spam emails to millions of email addresses and websites. All of these emails will be spoofed to appear as though they’re […]