Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.
Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.
Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million—that’s 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?
There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.
With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.