View Post

Are You PhishProof?

In Security by Alex PattersonLeave a Comment

Phishing is one of the most common forms of cybercrime, so if you’re online, you’ve likely been targeted by a phishing attack—and you might not even know it. So what is phishing exactly? It’s the act of collecting personal information—including bank account numbers, passwords, and usernames—through electronic means, such as deceptive email messages and phone calls. According to RSA’s report …

View Post

How To Avoid Being the Victim of a SMiShing Attack

In Security by Alex PattersonLeave a Comment

SMiShing is not a new tactic. A form of phishing, SMiShing is an activity that involves someone attempting to trick you via text or SMS message. If the trick is successful, the individual will receive your critical personal information. Did you know that there are approximately 913,242,000 texts sent every hour of every single day around the globe? This translates …

View Post

Instagram Phishing: How to Prevent It and What to Do If It Happens to You

In Security by Patricia EvansLeave a Comment

Phishing is the most popular way to hack Instagram accounts, because, according to the hackers themselves, it’s the easiest! Instagram Phishers simply create a fake login page that looks just like the one on the “real” Instagram. Hackers create this spoofed login page through fake apps promising to help manage Instagram users’ accounts and use free hosting and paid accounts …

View Post

5 Reasons DevOps and Security Need to Work Together

In Security by Daniel NewmanLeave a Comment

There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are …

View Post

How to Create an Effective Business Continuity and DR Plan

In Security by Toby OwenLeave a Comment

We rarely get a warning when disaster is about to strike, be it a natural disaster or a cyberattack. Your best chance at detecting, containing and responding to a disaster of any kind is through a tested and proven plan. An effective business continuity plan and DR Plan provides detailed instructions before, during and after disaster strikes—and can make or …