Transitioning to Remote Work

Over the past few weeks, we have helped several of our customers transition their in-office operations to remote operations, securely and efficiently. The security of a home network, when it’s being used for work, is just as important to pay Read more…

Types of Phishing Attacks, Part 2: Whaling

“Whaling” is another evolution of phishing attacks that uses sophisticated social engineering techniques to steal confidential information, personal data, access credentials to restricted services/resources, and specifically information with relevant value from an economic and commercial perspective. What distinguishes whaling from Read more…

Social Engineering

Social Engineering is defined as follows: The art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. Social engineering happens in both the physical world and the digital world. We are going Read more…