While QR codes have been around for a while, this is the first time I’ve seen this phishing technique used in a real attack. Attackers are sending users QR codes...
It’s a good idea to have a password expiration policy, but how will users know it’s time to change their password? Maybe it expires when they are on vacation or...
As part of a vulnerability management program its important to run a vulnerability scan of your systems on a regular basis. When the scan is complete there are usually thousands...
There has been concern within organizations regarding the use of ChatGPT, as some employees may input personal or confidential information into the platform’s interface. The concern is that this information...
Data security is a top concern in today’s digital age. Your email provider’s Data Loss Prevention (DLP) policy protects against data breaches and Business Email Compromise (BEC) attacks.
You may have gotten the following Out Of Office (OOO) messages from business contacts several times in your professional career after emailing them. See if you can spot any information...
I came across the term “Field CISO” and wondered what a Field CISO does. Is it sales and account management or just consultation? Is it vendor-centric? Are the goals of...
We are thrilled to share the news of an upcoming book signing event at this year’s Wild West Hackin’ Fest (WWHF) conference in Deadwood, South Dakota, on Friday, October 20,...