ProcessBolt

The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Mobile Phishing Attacks

The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to phishing websites via SMS messages, where they ask for your credentials. One study estimates that 75% of phishing websites specifically … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

Fortify Your Network Against USB Threats by Implementing Device Control

Author(s):

Sathya R, Product Specialist, ManageEngine

USB devices and device control

How important is it to protect your organization from USB threats? USB devices are a popular choice when it comes to transferring data, but they can pose significant security risks for your organization. The plus points of USB devices are their size and efficiency; however, if these devices aren’t monitored or restricted appropriately, all it … Read more

Even Cyber Pros Fall Victim to Cybercrime and Bad Habits

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Cyber Pros Fall Victim to Cybercrime

Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into a trap where a backdoor was installed on unsuspecting researchers’ operating systems. This scheme was discovered by Google’s Threat Analysis … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

Overcoming Work-From-Home (WFH) Challenges are the Secret to Cybersecurity Success This Year

Author(s):

Stefan Maraj, Staff Writer, United States Cybersecurity Magazine

2020 was a mixed year as far as the cybersecurity community was concerned. On one hand, the raw figures are hard to argue with – a new Cloud Security Report 2021 from Wandera found 52% of organizations dealt with a malware incident in 2020, up from 37% in 2019. Cyber threats are growing across the … Read more

Fraud Prevention With Good Cybersecurity Practices

Author(s):

Kayla Matthews, ,

Fraud Concept

Financial fraud cases show up in the headlines regularly. Yet people don’t necessarily connect these cases to cybersecurity. However, it’s often true that good cybersecurity makes a person or company less likely to experience financial fraud. Cybersecurity Starts With Awareness Many scammers who operate online pose as legitimate brands, such as banks or e-commerce companies. … Read more