What is Spear Phishing in Cybersecurity?

spear phishing featured

According to VPN provider and Internet research group Atlas VPN, Google registered over 2 million phishing sites targeting victims in 2020 alone. Threats like phishing, spear phishing and whaling are only rising, with F5 Labs reporting that more hackers are leveraging cheap or free cloud platforms and domains to launch sophisticated attacks. More importantly, email attacks against large enterprises are rising as well to the tune of around $80M per attack.

Read More

What are Insider Threats and How Does Compliance Help You Stop Them?

insider threats featured

When business professionals talk about security threats, they often talk about external threats: hackers, phishing attempts, DDoS attacks and so on. However, according to a 2020 survey, 66% of organizations consider the threat of an inside attack more likely than external ones. According to another survey by the Ponemon Institute, insider threats increased by 47% from 2018 to 2020. Additionally, the costs of these attacks increased 31% to $11.45M in 2020. 

So, what is an insider threat? Insider threats are breaches, disclosures, or theft of private and protected data by someone inside an organization. These thieves will almost invariably have authorized access to the data in question, or a way to receive that authorization either legitimately or by stealing credentials from a colleague. 

Insider threats don’t just originate from current employees, either. Many of these breaches occur when a former employee continues to have access to sensitive systems, or they communicate with an accomplice that has such access. 

 

Read More

What are Enclaves and Why Are They Important for Handling CUI?

Security enclave featured

One of our country’s more important assets is its information. The U.S. IT infrastructure carries private information covering things like financial information, private information, defense and military information or information that is critical to the operation of government agencies. Some information is classified, and some, while not deemed sensitive enough to classify, are protected as Controlled Unclassified Information, or CUI.

CUI is protected under government regulation, which means that if your business wants to work with federal or defense agencies, it must meet regulations to participate. 

Read More