Data Security

February 13, 2018
Comments [0]

A new breed of phishing scam is hitting employers around the world-and it's targeting employees' paychecks.

Here's how a payroll phishing scam works:

Scammers create an authentic-looking email that appears to be sent from the employer. The employee receives an email requesting she click on a link, answer a few questions, or visit a website, where she will be directed to confirm her identity by providing their log-in... Read More
February 10, 2018
Comments [0]

There was a stunning cyberattack on a critical Middle Eastern infrastructure site recently and it hasn’t gotten the public scrutiny it deserves. Triton (A.K.A. Trisis), a new strain of ...

Read More
February 2, 2018
Comments [0]

It was just one year ago that we changed our company name to reaffirm our mission to watch over clients in a dangerous world of pervasive cyber threats.

Now, we're excited to be recognized for efforts.

The latest issue of NAMIC's [IN]surance magazine is dedicated to the importance of branding and upholding brand...

Read More
January 31, 2018
Comments [0]

Just when you thought it was impossible to use a connected device without getting hacked2018 arrives with the discovery of an entirely new class of network vulnerability built into...

Read More
January 31, 2018
Comments [0]

In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit personal trackers to military personnel in 2013 to fight obesity.

... Read More
January 11, 2018
Comments [0]

The Winter Olympics in Pyeongchang, South Korea start next month and hackers are using the pretext of the games to launch phishing attacks featuring custom malware that, if downloaded, allows an attacker to take control of a device.

... Read More
December 20, 2017
Comments [0]

Companies large and small expend a lot of time and effort shoring up their data-security defenses.

But scammers, ever vigilant, can go through the side door as well, exploiting accounts-payable departments with invoices for goods and services that are unwanted or even nonexistent. The goal is to fool or pressure an employee into cutting a real check for a fake charge, which can cost your business hundreds or even thousands of...

Read More
December 8, 2017
Comments [0]

Think the past year was tough on your organization’s cyber security? Ransomware, DDos attacks and other exploits are only going to get worse.

Fasten your seatbelts, it’s going to be bumpy ride—but with the right preparation, you can improve your organization’s cyber security posture.

Here’s our threat forecast for 2018:

Ransomware. Expect a decline in ransomware... Read More
December 8, 2017
Comments [0]

The time to integrate added security into our country’s personal identification system is upon us.

The Equifax data breach released into the wild 144 million unique U.S. Social Security numbers. Future verifications used to prove identity to a prospective employer, creditor or educational institution should combine biometric...

Read More
November 27, 2017
Comments [0]

It should come as no surprise that small and medium-sized businesses are often more vulnerable to cyber attacks than large corporations. These businesses not only suffer from a lack of resources to protect themselves against cyber threats, but they also suffer from a lack of awareness that they could be targets of cyber criminals in the first place. More often than not, SMBs are more concerned with making payroll and getting their taxes filed versus implementing...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started