Phishing

Why Dashlane Will Never Ask You for Credentials in an Email (Because That’s How Phishing Works)
Dashlane will never ask for your credentials or account information in an email. Knowing this will help you avoid sophisticated phishing attacks.

Traveling Soon? Add These 5 Cybersecurity Essentials to Your Packing List.
With wider vaccine availability and country borders opening up, many of us are packing our bags. Here’s why you shouldn’t leave cybersecurity at home.

You Asked, A Hacker Answered: 7 Questions With Rachel Tobac
Social engineering expert and white-hat hacker Rachel Tobac tells us just how cautious we should be online.

What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.

Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal to nurture a blame-free, empowering security culture where all employees feel they are contributing to a shared goal.

Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of “This Is How They Tell Me The World Ends” shares her predictions for the future and life-saving cybersecurity tips.

What You Can Learn About Cybersecurity From Snooping on Your Crush Online
We may not be proud of it, but most of us have creeped on a crush or ex online when curiosity got the best of us. Here’s how to turn it into a lesson rather than—like your therapist told you— an unhealthy waste of time.

New Attacks Targeting Remote Workers, Recent CISA Analysis Reveals
The shift to remote work has forced companies to change how they think about their security. CISA recently published a report highlighting an increase in successful phishing attacks exploiting cybersecurity weaknesses of remote and distributed teams.

How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports them. In fact, real-time phishing simulations have proven to double employee awareness retention rates, and yield a near 40% ROI, versus more traditional cybersecurity training tactics, according to a study […]

Keeping Your Personal Info Safe While Filing Taxes Online
There’s nothing like that feeling of relief once you’ve finished filing your taxes, and e-filing services like TurboTax and H&R Block definitely ease the pain of getting to the finish line. During tax season however, the IRS warns consumers to avoid common tax scams—from unscrupulous return preparers to phishing emails and websites. So when submitting […]

How to Spot a Phishing Scam
Sometimes it’s obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO of your company asks for your credit card information via email? Something is definitely off. But often phishing is harder to spot. Phishing is a common scheme in which someone […]

4 Cyber Threats Targeting Small Businesses in 2017
It’s too dangerous for organizations of all sizes to put the issue of cybersecurity on the backburner in 2017. One study found that small businesses making $100,000 incurred a total security incident cost of $24,000 on average—nearly a quarter of annual earnings. By comparison, the cost for billion-dollar enterprises amounted to less than 0.1% of […]