As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.
Read More
Topics:
Cybersecurity,
Social Engineering,
Cyber Defense,
Ransomware,
Cybersecurity Awareness
The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.
Read More
Topics:
Cybersecurity,
Social Engineering,
Cyber Defense
Email completely changed the way we communicate and the way we do business. While it makes us more efficient, it comes with a cost. And that is the risk of a data breach. There are a myriad of studies that reach the same conclusion year after year. The majority of cyberattacks begin when someone clicks on a link in a phishing email.
Read More
Topics:
Social Engineering,
Risk Management
It’s that time of year again! October marks the 13th annual National Cybersecurity Awareness Month (NCSAM), and Tyler is proud to show our support as a NCSAM Champion. The overall theme of the month – that the internet is a shared resource and securing it is our shared responsibility – is one that resonates with us. It’s a civic duty as far as we’re concerned because unprotected resources, unprotected networks, unprotected computers, and unaware people are used to attack and harm others.
Read More
Topics:
Social Engineering,
Cybersecurity Culture
Social engineers are very adept at tricking people to get what they want. Whether trying to acquire sensitive information or gain access to a restricted area, they prey on our basic human nature by building trust and confidence. Because of this, social engineering poses a significant security risk to your organization, and should be part of your overall risk-management strategy.
Read More
Topics:
Social Engineering,
Cyber Defense
Human beings are trusting by nature, and that makes us vulnerable to social engineers. Here are four simple tricks you can use to defeat a social engineering attack.
Read More
Topics:
Social Engineering,
Cyber Defense
Technology is not enough to keep you cyber secure. You must also consider the human element. Your employees are an important first line of defense against a cyber-attack. Unfortunately, they are also your weakest link. Some of the most highly publicized data breaches over the last several years, including Target and Anthem, were the result of a successful social engineering attack.
Read More
Topics:
Social Engineering,
Cybersecurity Culture
One of the most common methods used to distribute malware is a phishing (fraudulent) email. Embedded in the email will be a “call to action” link, asking you to click here to learn more. The seemingly benign action of clicking on the link can start a destructive chain of events that culminates in compromising your computer, your identity, or even your business.
Read More
Topics:
Social Engineering,
Cyber Defense