Transitioning to Remote Work

Over the past few weeks, we have helped several of our customers transition their in-office operations to remote operations, securely and efficiently. The security of a home network, when it’s being used for work, is just as important to pay attention to as the business network. If you or someone Read more…

Types of Phishing Attacks, Part 5: Baiting

Baiting is a social engineering tactic with the goal of capturing your attention. Baiting can be found in search results, social media or emails. For businesses, baiting often comes across as a request for help. During the baiting attempt, victims are asked to verify company credentials and confidential information. This Read more…

Types of Phishing Attacks, Part 4: Pretexting

The term “pretexting” indicates the practice of presenting oneself as someone else to obtain private information. Usually, attackers create a fake identity and use it to manipulate the receipt of information. Attackers leveraging this method of social engineering use several identities that they have created during their carrier. The success Read more…

Types of Phishing Attacks, Part 2: Whaling

“Whaling” is another evolution of phishing attacks that uses sophisticated social engineering techniques to steal confidential information, personal data, access credentials to restricted services/resources, and specifically information with relevant value from an economic and commercial perspective. What distinguishes whaling from phishing and spear phishing is the choice of targets: relevant Read more…

Social Engineering

Social Engineering is defined as follows: The art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. Social engineering happens in both the physical world and the digital world. We are going to briefly discuss examples/methods of both. In later posts we Read more…