"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Small to Medium-sized Businesses (SMB's) are attacked fifteen times more often than smaller firms (>10...
Read more
Image Source Privacy legislation has expanded significantly in the last two years with the publication and...
Read more
Image Source The latest way hackers are breaching your private information is by using malicious Quick Response...
Read more
CyberHoot received notice today that our Café Press account had been breached along with 23 million other...
Read more
Image Source On July 29, Capital One announced it experienced a data breach affecting over 100 million...
Read more
Image Source Remember the last time you had to recover access to an account by resetting your password. Maybe...
Read more
How Phishing Attacks Work An easy example of how phishing attacks work is to take a look at a case that...
Read more
Overview: On May 14, Microsoft issued a software update patch for its Remote Desktop Protocol (RDP)....
Read more
Editors Note: This is a reprint of an article I wrote for New Hampshire Business Review in June 2017...
Read more
We’re all familiar with using passwords and some are experienced with password managers, but they aren’t...
Read more
Overview In May of 2019, medical testing company, Quest Diagnostics had their second data breach in three...
Read more
Sextortion Scam Hackers are using new tricks to get information or money by blackmailing people through emails....
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
