Following big global events and natural catastrophes such as hurricanes and big earthquakes, fraudsters will take advantage of the vulnerability of victims and the empathy of far-away observers to trick people into giving out valuable personal identifiable information or money.
AwareGO security blog
Stay up to date on cyber security threats and news with the AwareGO Cyber Security Blog. We bring you industry stories written for everyone who cares about cyber security. If you want a crash course in cyber security check out our free e-book: Cybersecurity for Dummies: AwareGO special edition.
Summer is here and the long-awaited vacations are just around the corner – at last! As much as we want to leave work behind when we activate that auto-reply and go on vacation, there are certain Out of Office risks and cybersecurity issues that we need to keep in mind when we go on vacation.
There’s nothing in this life certain except for taxes and phishing emails! If you want to avoid falling for tax season scams, read on and follow AwareGO’s pro tips.
Online shopping is catching on quick. Everybody’s doing it! And you can get great deals too. However, criminals will try to get you to visit fake websites by offering great deals.
In and of themselves, phishing simulations don’t raise awareness. Neither does forcing those who “failed” to sit through a lecture or long videos on cyber security. Phishing simulations, however, do give companies an indication of where they’re at awareness wise. An awareness score, if you will. But it only applies to the kind of phishing that was tested in the simulation. What it doesn’t tell you is…
The key to spear phishing is that the criminal knows something about the recipient.
No matter how great your software is, it only takes one person to click the wrong link.
Ransomware attacks seem be everywhere and it seems like there’s a new and nastier version out every day. But it is possible to prevent ransomware from getting onto your network in the first place.
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity.