Watering Hole Attacks: How to recognize and respond to them

Posted by Manas Parthasarathy on Aug 13, 2019 9:40:00 AM

You probably have a list of websites you access on a daily basis, either personally or for work; these might include email domains, internal portals, or your accounts with vendors. Over the course of a day, you likely access these services numerous times, resulting in anywhere from hundreds to thousands of interactions per year. You probably trust these websites, but it’s important not to let your guard down. Cyberattackers commonly ‘stake out’ a network ecosystem before attacking, and through observation, they may notice a vulnerability in a location that is accessed by numerous people in an organization. This can be the beginning of a watering hole attack, even if your computer isn’t infected.

Read More

Topics: phishing, cybersecurity

How to Protect Your Business from In-Session Phishing

Posted by Manas Parthasarathy on Jun 27, 2019 9:30:00 AM

If you take a look at the number of tabs open in your browser, you might realize that you have way more open than you’re actually using. Some might open automatically when you open a link, whereas others may be older tabs that you haven’t closed yet. Most of us don’t pay too much attention to our open tabs as we browse, and with the evolution of browsers, operating systems, and computer hardware, our computers become more capable of handling activities such as having a dozen web pages open simultaneously.

Read More

Topics: Cyber Security, phishing

Pharming: What it is and how to protect your business

Posted by Manas Parthasarathy on May 30, 2019 8:44:39 AM

Some cyberattacks can be fairly easy to notice. A phishing email might be identified by the sender address, formatting, or the address of a link, while vishing could be identified by someone asking prying questions over the phone. Some attacks, however, may be tougher to spot. There are a few types of these, one of the most notable being pharming.

Read More

Topics: Cyber Security, phishing, pharming

Smishing: How to protect yourself and your business from cybercrime

Posted by Manas Parthasarathy on May 28, 2019 7:30:00 AM

You’ve probably heard of phishing, the infamous practice by which a hacker may try to trick you into giving away sensitive information via email. However, there is much more to phishing than just a suspicious email here or there; as individuals and businesses become more savvy about threats like those that may come via email, cybercriminals expand their arsenal of tools to cost you precious time and money. One example of this is smishing.

Read More

Topics: Cyber Security, phishing, smishing

Vishing: What it is how to protect your business

Posted by Manas Parthasarathy on May 21, 2019 10:10:40 AM

Phishing is a widely known cybersecurity risk; you’ve probably heard of it. A cybercriminal sends a convincing email, complete with a link to what looks like a company’s website at first glance, only to attempt to obtain your login credentials for their own use. Over the past decade, consumers and businesses alike have been taking steps to protect themselves from this threat. What you may not know, however, is that there are various types of phishing attacks beyond those carried out exclusively over email. One such type is vishing.

Read More

Topics: Cyber Security, phishing, vishing

7 of the Most Common Phishing Attacks and How to Protect Against Them

Posted by Jill Sullivan on May 15, 2019 7:30:00 AM

With internet access and availability having increased significantly over the past few years, more people now conduct their transactions online. Knowing this, cybercriminals spend considerable amounts of time and money looking for ways to access private personal information or confidential business information for nefarious reasons. Of the many techniques used by cybercriminals to obtain private and confidential information, one of the most endemic is phishing.

Read More

Topics: Cyber Security, email security, phishing, vishing, smishing, pharming

Subscribe to our Blog!

DR Guidebook CTA

Recent Posts

Posts by Tag

See all