A few years ago, my software company was a victim of a cybersecurity attack in which the intruders were able to get a hold of our Stripe account and change the bank information so that all the funds were being deposited into their own account. It took our team at JustReachOut months to get our...
Search Results
How Businesses Can Secure Data from Shared Files After Employees Leave
The most common collaboration tools allow admins to capture and reassign important information. A decade ago, businesses struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent of modern office productivity suites changed that...
Cybersecurity Awareness Training: 6 Tips To Raise the Bar on Security
The hybrid work era has significantly increased the attack surface and the risk of data breaches. Organizations must reorient cybersecurity awareness training to limit human error. Let’s hear from experts on what it takes to build a robust security awareness program. Ransomware attacks have risen...
14 Financial Documents that Business Leaders Should Keep a Hard Copy of (Even in the Digital World)
Many organizations are digitizing more and more of their operations and files. From cloud storage to online signing platforms, it's easier than ever to scale back the use of printed documents. However, companies would be wise to keep a printed version of certain documents on hand. Below, the...
How to Send Large Files Fast Without Compromising Security
Sending large files over the internet comes with a giant security risk. Files can be hijacked in transit and if you don’t use a secure file transfer system, your files can be accessed by an unknown number of people. For many people, sending large files online is unavoidable. If you can’t get...
Here’s Why Data Security Matters if Contact Centers Go Remote
With so many risk factors, contact centers must stay a step ahead of fraudsters, regardless of how many security controls they already have in place. Contact centers hold a wealth of sensitive information and data breaches can pose significant security risks to your customers too. If one were to...
Digital Convenience Leads to Lax Security Habits Among Users, Survey Finds
A new IBM global report examining consumer behaviors finds an average of 15 new online accounts were created and 82% are reusing the same credentials some of the time.Screenshot of IBM's report on Pandemic Security Side Effects. Image: IBMNot surprisingly, consumers shifted further into digital...
Encryption Helps Companies Avoid Breach Notifications
With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds. Companies that encrypt sensitive data have a significant chance to avoid the most major costs from a data breach because the theft of encrypted...
No Matter the Size of Your Business, You Must Take Security Seriously
The automated attackers who are out there ready and willing to get you don't care how small your business is. I recently wrote about using passwords correctly, and a reader replied: "I've been getting told this for years, but who's ever going to attack my 12-employee business?" This isn't the...
Scam Alert: LinkedIn Users Hit by Malware from Fake Job Offers
With rampant unemployment ongoing, a job offer through LinkedIn can seem like a godsend. Watch out though, as some offers aren’t what they seem. The common garden-variety phishing attack uses a technique some experts call spray and pray. Fraudsters set up a clone of some sensitive site such as an...
Why Executive-Focused Security Awareness Training is Important
Willie Sutton was a bank robber in the early 1900s, and a quite successful one at that. Over a long and less-than-illustrious-but-more-than-successful career, he amassed over US$2 million. Even without considering inflation, that’s a serious chunk of change. When an interviewer asked him why he...
Everything You Need to Know About Phishing and Pharming
Today, the ever-evolving technology has taken society to the next level of evolution. However, it has also paved a path for malicious actors to misuse it and exploit unwary users. Day after day, cyber criminals are growing more sophisticated and smart. They have been honing their skills in order...