Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

Pretexting: The Art of Impersonation

Author(s):

Patrick Putman, ,

Pretexting, hacker working on business interface, sinister, animated

What is Pretexting Pretexting is a social engineering tactic that uses deception and false motives. Simply put, pretexting crafts fictional situations to obtain personal, sensitive, or privileged information. Pretexting often involves researching the target prior to the attack. The data collected is then used to manipulate and deceive the victim. The main goal of the … Read more

Email: The Ultimate Phishing Hole

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hole in the ice, fishing line in the hole, boots to the side, email phishing abstract

Recently, we talked about the importance of questioning everything when it comes to cybersecurity; telephone calls, websites, text messages, snaps, any of these mediums are a forum for viruses. As the threats continue to change and grow, many people have started to become more aware of how widespread phishing has become. Phishing has grown in popularity, … Read more

Threat Intelligence: How It Can Help Tackle Malware, Phishing and Hacking

Author(s):

Jonathan Zhang, ,

Man walking down red hallway with icons, threat intelligence abstract

Cyber attacks happen all the time and in multiple forms, causing tremendous harm — e.g., broken trust, financial loss, reputation damage, and intellectual property theft. So preventing and stopping threats surely sounds like a priority, right? The tricky part is that there is not just a one-size-fits-all approach to achieve that. Each organization is unique … Read more

Tips for Millennials on Cybersecurity Practices

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Millennials on their phones Cybersecurity

Millennials are at risk to be the victim of a cyber-crime. Millennials are in a constant state of media saturation. Growing up, many millennials have been bombarded with dated and cheesy propaganda designed to keep us “cyber safe”. Videos of large, talking computers who rap about the dangers of chat-rooms were a dime a dozen … Read more