A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense…
Join our CEO – Atif Mushtaq – and our CMO – Jan Liband – for must see webinar on Wednesday, March 27th at 10am PST. In just a short 30-minutes, you’ll better understand the social engineering landscape and what you can do to protect your organization and employees.
Given the human element at the forefront of these sophisticated phishing attacks it’s becoming apparent that today’s mainstream phishing security solutions are simply too slow to be effective. Read our blog and check out the Aberdeen Report for details.
Two-factor authentication (2FA) does not protect against exploits and malware, scareware, social engineering scams, rogue software, or phishing callbacks. Meaning? It’s a best practice we recommend but it’s only part of a larger recipe for success.
ere are email-based and other non-email-based phishing attacks that people need to be aware of. Here we examine phishing, spear phishing, whaling, smishing, and vishing and the differences between them.