Improving communication within an organization has been proven to increase productivity; that’s easy to see. A study by SalesForce found that more than 80% of employees and executives believe weak communication is the main cause of workplace failures. What might those workplace failures look like? Missing a deadline or offending a client are bad outcomes, but we also need to prepare against exposure of sensitive or personal information.
In this series, ProCircular’s team of information security specialists break down the top cybersecurity risks for small and medium-sized businesses in 2023. How do SMBs prepare for cybersecurity threats and prevent security incidents? Trevor Burke lays out the best ways to get leadership’s support behind security investments.
Read More
Topics:
Cybersecurity,
Information Security,
Data Security,
Security Awareness Training,
vCISO
In this series, ProCircular’s team of information security specialists will break down the top cybersecurity risks for small and medium-sized businesses in 2023. How do SMBs prepare for cybersecurity threats and prevent security incidents? Trevor Burke lays out the special precautionsorganizations can take to lower the likelihood of incidents caused by internal threats.
Read More
Topics:
Cybersecurity,
Information Security,
Data Security,
Security Awareness Training,
vCISO
Phishing Attacks
During a
phishing
attack
, attackers use
social engineering
and
malicious emails to
steal valid credentials
from users.
Attackers can use these credentials to begin more complicated attacks, or they can
bundle
and sell them
to other
cybercriminals
.
The
attacker
s
lie about their identity and objectives to
collect
login information from unassuming
victims
or to get them
to download malicious content
. These
emails might ask you to enter your password into a
spoofed
login page or send
that
information directly
back to the sender
.
Although these scams are well
-
known, they are occasionally hard to spot, and they
have a
high rate of success
.
If you
don’t
encounter many of these emails, they may be caught in your
junk folder. If this is the case, your email filtering is working effectively and
removing potentially harmful
phishing attempts.
There is no reason to recover
phishing emails from a junk folder.
Extortion Attacks
Extortion emails work a little differently
.
In this
increasingly popular
type of attack, the hackers claim to
already have access to some sensitive information. That information could include
anything from login
credentials to embarrass
ing photo
s. Whatever they choose is something designed to prompt an
urgent
and desperate reaction from the recipient.
In the email, they lay out what they have against
their target,
then threaten to blackmail them for money.
These types of emails are des
igned to be scary. They are supposed to make the victim feel
so
frantic
that
they
act without thinking.
If you ever
receive a
threatening extortion email, remain calm and report it
t
hrough
the proper
channels. In this post,
we’ll break
down a poorly writte
n extortion email
that was
sent to my junk folder.
Read More
Topics:
Information Security,
Data Protection,
Personal Data Protection
How do you know if you have a solid cybersecurity program? You may have anti-virus installed and you change your computer password quarterly, but how do you know if your security program is truly effective? When you can’t see your gaps, it’s hard to make improvements and even harder to pick up the pieces after a security breach. That’s why Cybersecurity Consultants, like ProCircular’s Andrew Chipman, collect all the information they can, then measure your active security controls against their library of applicable standards.
Read More
Topics:
HIPAA,
Information Security,
Data Protection,
it risk assessment,
DFARS,
Manufacturing,
risk