How To’s: Your go-to when in doubt
No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.
Learn how to quickly get the hang of ATTACK Simulator
You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:
- How to get started
- How to create your first simulation
- How to whitelist
- How to understand reports
7 More Spoofing Techniques Your Employees Should Watch Out For
Phishers heavily rely on cunning, highly sophisticated spoofing techniques, with email and website spoofing being the most common. However, other methods are gaining traction as well. In this article, we'll cover seven more spoofing techniques that scammers use in...
Spoofing: 2 Most Common Types & How They’re Used In Phishing Attacks
Phishing is quite a serious issue in today's heavily digitalized world. Spoofing is often the way attacks happen. Let's take a closer look at the most common spoofing techniques in a phisher's arsenal. Phishing And Spoofing Go Hand In Hand By definition, a phishing...
10 Best Practices To Avoid BEC And CEO Fraud Attacks
In today’s heavily digitalized world, BEC and CEO fraud attacks can result in massive losses, and no company is safe. Scammers might make yours their next unlucky target. But not to worry. We’ve got you covered with our list of 10 best practices to prevent BEC and CEO...
7 More Phishing Strategies That May Be Targeting Your Company Right Now & How To Identify Them
With all the cyber dangers lurking in the dark corners of the Internet, it’s time you discover another seven common phishing strategies that may be threatening your company as you read this. Phishing is the root cause of devastating ransomware attacks, data theft, and...
Cybersecurity Awareness Month: 12 Tips To Help You And Your Company Dodge The Phishing Hook
It’s beginning to look a lot like... Cybersecurity Awareness Month. So, what better time to improve your hook-dodging ability, especially with phishing becoming a hacker’s favorite leisure activity? Keep reading to discover twelve tips that will help you keep scammers...
7 Types Of Phishing Attacks & How To Spot Them
As a tale as old as time, phishing is as old as the Internet itself. Cybercriminals launched the first phishing attacks as early as the 90s, stealing passwords and financial information. Since then, malicious operations that plague both individuals and companies have...
No more “Son, how do I…?” Find your answers here
Computer security can be an intimidating subject. We prepared a few guides to get you started.
- Introduction to Antivirus Solutions
- Introduction to VPNs
- Security when working from home
4 Clever Black Friday Scams & How To Avoid Them
Cybercrooks never miss an opportunity to net some money from unsuspecting victims. With massive discounts and sales coming our way in late November, it's not that hard to click on the wrong link or provide your payment details to the bad guys in our quest to score a...
9 Best Anti-Spoofing Practices Your Employees Need To Follow ASAP
What if one of your employees receives an urgent email from a supplier, and clicks it - and boom, your entire business could be compromised by a spoofing attack? But we've got you covered with our list of nine best anti-spoofing practices you need to educate your...
Top 5 Phishing Tricks Your Employees Should Watch Out For
Phishing has become a very lucrative business, and scammers can get very creative with the phishing tricks that they use. This article will walk you through the five most common tactics cybercrooks use to convince you to hand over your precious sensitive data....
10 Best Practices To Avoid BEC And CEO Fraud Attacks
In today’s heavily digitalized world, BEC and CEO fraud attacks can result in massive losses, and no company is safe. Scammers might make yours their next unlucky target. But not to worry. We’ve got you covered with our list of 10 best practices to prevent BEC and CEO...
Business Email Compromise 101: Definition, Techniques, Types, And Precautions Against It
Business email compromise (BEC) is a form of phishing in which the attacker impersonates someone on a corporate network to trick the target into sending money to the attacker’s account. BEC scammers usually pick on companies that use wire transfers to pay...
Ransomware Attacks: Knowing Your Company’s Weaknesses Is Key To Stopping Them
Ransomware attacks happen all the time, and your business could become the next target. A company that can't objectively assess its own security flaws makes for a perfect potential victim. Knowing your network's vulnerabilities can help you stop such attacks. This...