Skip to content

Category: Cybersecurity

Winner Scams

Winner Scams

Winner Winner Chicken Dinner! What do these three real e-mails have in common? 1. Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” 2. WalmartStores – “Re: CONFIRMED: Paul […]

Bruce Willis Cole Sear Sixth Sense

7 Ghosts of Cybersecurity

“I see dead people.” Because while you’re worried about fake ghosts this spooky season, real ones are already haunting your inbox, your bank accounts, and your business network. They don’t […]

Mark Wahlberg Deepwater Horizon

Man Made Problems In Digital World

On April 20, 2010, Deepwater Horizon, an oil drilling ship operated by private contractor Transocean, is set to begin drilling off the southern coast of Louisiana on behalf of BP. […]

Incident Response

Incident Response Readiness

Incident response is the regular practice to identify, mitigate, and report cybersecurity threats. Most organizations aren’t prepared for the inevitable even though it’s state and federal law. A cybersecurity breach […]