Mimecast have just released a new report which reveals an 80% increase in impersonation or Business Email Compromise (BEC) attacks.
Information Security and SMiShing :
Getting to know the new lure sophistication classifications, and how they can help your next campaign.
In 2017, Symantec reported that phishing rates had increased across most industries and organisation sizes. News sites consistently report on the biggest and scariest malware attacks and data breaches, and then ultimately attribute the increased susceptibility to one of many new phishing trends. But what in fact constitutes a highly-sophisticated phishing message? And how can this knowledge help you strategically plan and execute your next test campaigns.
A company’s staff is the greatest untapped resource in the fight against cybercrime. Although research has shown that in 90% of successful cyber-attacks or more, there is an element of human fallibility involved, what those studies fail to mention is that a trained and vigilant staff could become the greatest barrier of defence against attack types: such as trojans, viruses, ransomware, and other electronic security threats.
Cyber-security education and awareness programs are an indispensable part of a balanced corporate security strategy. These programs equip staff with the tools that they need to be part of an overall security solution.
A widespread cyber attack has been coming folks, and many security professionals are attempting to increase awareness for staff and companies.
Two days ago I shared an article from AIG that stated "systemic cyber attacks" were expected this year across several sectors, including healthcare.
A new British Chamber of Commerce (BCC) survey of over 1,200 companies (96% SMEs) reveals cyber-criminal attacks occurred on one in five UK firms over the last year.
Despite the very real threat this poses to businesses, the majority (63%) rely on IT providers to resolve any issues.
Most of us would like to think we are cyber aware and know better than to respond to a phishing email from our bank, asking us for account details, passwords and other personal details. But what happens in your organisation if the email and links appear to come from a trusted sender, or a known person in authority?