Recent articles in this category:
Most people have heard of phishing emails by now. Fewer are prepared for the phone call version. Vishing -- voice phishing -- uses phone calls instead of emails to trick people into handing over passw...
Phishing simulations can help employees recognize and respond to real attacks. They can also backfire badly if done wrong -- creating distrust, anxiety, and even damaging your company's email reputati...
This is a concise reference card for the most common phishing techniques. Print it, post it near workstations, or include it in employee training materials.
Phishing emails have gotten much harder to spot. The obvious typos and Nigerian prince scams still exist, but the attacks targeting businesses today are far more polished. Here are the techniques atta...
The old movie "WarGames" had it right: sometimes the winning move is not to play. When it comes to phishing and IP theft, the most effective defense starts with refusing to engage with suspicious comm...
Your employees are your first line of defense against phishing. Technical controls catch a lot of malicious email, but some attacks will always get through. What happens next depends on whether your p...