The Anatomy of Business Email Compromise (BEC)

Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments, then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating, with losses regularly exceeding Read more

By Eric Vanderburg, ago

Cybersecurity Concerns in an AI-driven World

In the era of rapid technological advancement, artificial intelligence (AI) is revolutionizing our lives. From self-driving cars to advanced medical diagnostics, AI’s impact is both profound and pervasive. Yet, as we embrace these innovations, we are also exposed to a host of new cybersecurity challenges. This article delves into the Read more

By Eric Vanderburg, ago

Email Litigation Holds and Microsoft 365

A litigation hold, also known as a legal hold, is a preservation order that ensures relevant data is protected when an organization anticipates or is undergoing a lawsuit or investigation. Litigation holds serve several important purposes: 1. Preservation of Evidence: A litigation hold ensures all relevant documents, emails, data, etc., Read more

By Eric Vanderburg, ago

Reflecting on Cybersecurity in 2020 and the Road Ahead

Learning Objectives: This article on cybersecurity in 2020 includes: A brief overview of COVID-19’s impact on businesses Information on exposed data (hint: it was record-breaking) Threats faced by small and medium-sized businesses Related Information: Cybersecurity Bulletin: SolarWinds Data Breach The Pandemic | Data Breaches | SMB Threats | Conclusion We Read more

By , ago