Check out the findings of the Verizon report on ransomware, social engineering and phishing
Check out the findings of the Verizon report on ransomware, social engineering and phishing Verizon’s new Data Breach Investigations Report (DBIR) reinforces key aspects that need to be continually discussed
7 benefits of microservice architecture
7 benefits of microservice architecture Microservice architecture is based on a modular approach. In practice, this means developing a system in small parts, the so-called microservices, which are usually placed
8 tips to improve small and medium businesses’ (SMBs) security
8 tips to improve small and medium businesses’ (SMBs) security Yes, small and medium businesses (SMBs) are one of the main targets of cyber attacks. Why? First, SMBs don’t usually
6 types of anti-spam filters and how they work
6 types of anti-spam filters and how they work The vast majority of internet attacks start with an email. To get an idea of how important it is to talk
What is microservice architecture and monolithic architecture?
What is microservice architecture and monolithic architecture? Microservice architecture and monolithic architecture are terms used to refer to two ways of thinking and building the architecture of applications and software.
What is spyware?
What is spyware? As its name suggests, spyware is a spy software and one of the top internet threats to businesses and individuals. Spyware is a type of malware (or
Phishing campaign that impersonates FBI director is back
Phishing campaign that impersonates FBI director is back It may sound like a joke, but in this not-so-new phishing scam, cybercriminals are trying to impersonate an FBI director to steal
6 steps to build an incident response plan
6 steps to build an incident response plan An incident response (IR) plan is a playbook that allows companies to act quickly in the event of cyberattacks and data breaches.
BEC remains the most damaging threat, says FBI
BEC remains the most damaging threat, says FBI According to the 2018 Internet Crime Report, gathered by the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks continue
What is the difference between bulk email, junk email and graymail?
What is the difference between bulk email, junk email and graymail? The question is simple but can still cause a lot of confusion: what’s bulk email, junk email and graymail?