business email compromise

How do you defend your business against business email compromise?

In a nutshell, business email compromise (BEC) is a broad category of cyberattack that uses email-based fraud to obtain access to sensitive and valuable business information. In a typical BEC attack, a cybercriminal poses as the victim’s superior (e.g., a manager or CEO) or a trusted party (e.g., business partner). The email directs the recipient to either share important information or it can tell the victim that a payment must be made to a new account. [...]

Read article

secure_your_business_cloud-storage

Tips to secure your business cloud storage

The ability to access company data from any internet-connected device enables American businesses to enjoy remote working setups during the COVID-19 pandemic. However, this convenience also makes it easy for cybercriminals to access your sensitive files using any device, even those they may have stolen from you or your staff. [...]

Read article

enterprise cloud services

Enterprise cloud services used for nasty phishing campaign

Phishing emails — the type that seem to come from legitimate sources but are actually ploys for stealing access credentials or delivering malware — have become even more difficult to spot in recent times. In fact, a newly discovered phishing campaign pretends to come from companies’ help desks and use enterprise cloud services to pull it off. Here’s how the scam works: [...]

Read article

cloud security

Top practices to ensure cloud security

Cybersecurity is a business aspect that managers in America understandably often put on the back burner. They want to focus on operations — and preventing data breaches is a complicated distraction they’d rather have someone else take care of. [...]

Read article

fetching more news