Fearsome Amex Phishing Scam

We know this horror story: A trusted character is not who (or what) others think he is. Typically, movie audiences get to see the creature’s eyes glow or go all black when the onscreen victim isn’t looking. Devils behind a recent phishing scam that targeted American Express accounts, however, were fiendishly clever about hiding their…

Read More

If IT Threats Were Cast as Star Trek Villains

The United Federation of Planets had a lot of enemies, and if you run a business, you also face some substantial threats to your operation. So in recognition of Star Trek’s 50th anniversary, we decided to cast IT’s most infamous bad actors as notable villains from the Trek shows and movies. Ransomware and Viruses as…

Read More

Are You Insured Against Cyber-Security Breaches?

Last month, we dedicated a newsletter article to insurance … specifically Cyber Insurance. Because this is such a complicated topic, we wanted to first remind you that no insurance policy covers everything … we’re all still responsible for taking common-sense precautions. But, as criminals grow ever more sophisticated, insurance riders like Cyber Insurance are no…

Read More

About those New Credit Cards with the Chips …

Sometime in the past year, your credit card company probably sent you a new card — one with an obvious chip installed on the front. (If you have not received one, don’t worry, you will.) The new cards are rolling out to help improve security against fraud by encrypting customer data and by creating a…

Read More

Prevention is Better than Insurance

If you deal with sensitive customer data and information, you may have considered purchasing “cyber insurance.” For those unfamiliar with the term, the International Risk Management Institute explains, “Cyber and privacy policies cover a business’ liability for a data breach in which the firm’s customers’ personal information, such as Social Security or credit card numbers,…

Read More

Network Security: What Is Risk Analysis?

When you think about risks to your business network … what comes to mind? Hackers? A server meltdown? Data loss? That would be an understandable response, but actually those aren’t risks. Instead, they are properly understood as “threats.” So what’s the difference, you ask? (Or pretend you did.) To conduct a proper risk analysis, look…

Read More