281.651.2254 service@securenetworkers.com
  • Facebook
  • Twitter
  • Instagram
  • RSS
  • Facebook
  • Twitter
  • Instagram
  • RSS
  • Goldman'Sachs 10,000 Small Businesses
  • Texas Department of Information Resources DIR
  • CUSTOMER PORTAL
Secure Networkers
  • Home
  • Team
  • Services
    • Security/Defense
    • Managed Services
    • Cloud Hosting
    • Collaboration
    • IT Solutions by Industry
  • Partnerships
    • Apple
    • Cisco Meraki
    • Cisco Systems
    • Cisco Webex
    • Dell
    • Fibertown
    • Microsoft
    • StorageCraft
    • VMWare
  • DIR
  • Resources
    • Affiliations
    • Blog
    • Demos
    • Events
    • TAGITM
    • Utilities
    • Video
    • White Papers
  • Contact Us
Select Page
Spoof Spotting

Spoof Spotting

by Katherine Parker | May 31, 2019 | Data Security, Device Security, Email Environment Security, General Information, Mobile Devices, Network Security, Uncategorized

Recognizing Those Trouble-Making Emails and Stopping Them in Their Tracks Spoof Spotting Transcript and Slides:Hello! My name is Katherine Parker. I represent Secure Networkers, a business dedicated to help businesses navigate through the often perilous terrain of...
Secure Networkers IT News Brief June 2019

Secure Networkers IT News Brief June 2019

by Katherine Parker | May 29, 2019 | Cloud Computing, General Information, Natural Disaster Preparedness, Secure Data Storage

IT News Brief June 2019:  Hurricane season is our annual reminder that all Southeast Texas businesses have to consider how to manage business operations remotely, and what would be the best disaster recovery solution to employ in the event a hurricane heads our way....
Business Email Compromise (BEC) Part 5 of 5: Attorney Impersonation

Business Email Compromise (BEC) Part 5 of 5: Attorney Impersonation

by Katherine Parker | May 14, 2019 | Data Security, Email Environment Security, General Information, Uncategorized

Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We have come to the fifth and final genre of BEC identified in the FBI’s 2018 Internet Crime Report. This final type is one that shares many elements with Account Compromise because...
Business Email Compromise (BEC) Part 4 of 5: The Bogus Invoice

Business Email Compromise (BEC) Part 4 of 5: The Bogus Invoice

by Katherine Parker | May 13, 2019 | Data Security, Email Environment Security, General Information, Uncategorized

Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation According to the FBI’s 2018 Internet Crime Report, Business Email Compromise (BEC) is the most successful method used to gain unauthorized access to networks. Techniques to do this...
Business Email Compromise (BEC) Part 3 of 5: Account Compromise

Business Email Compromise (BEC) Part 3 of 5: Account Compromise

by Katherine Parker | May 10, 2019 | Data Security, Email Environment Security, General Information, Uncategorized

Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We continue our look at the five kinds of Business Email Compromise (BEC) attacks that impact business. According to the 2018 Internet Crime Report produced by the FBI, the BEC...
« Older Entries

Recent Posts

  • Data Hackers: Why Cyber Attackers Want Your Data
  • Secure Networkers IT News Brief December 2019
  • Post Cyber Attack: Remediation with No Visibility
  • Secure Networkers IT News Brief, November 2019
  • Cost Savings and Private Cloud

Recent Comments

  • Katherine Parker on Email Spoofing: Just Delete It
  • Cassandra on Email Spoofing: Just Delete It

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • June 2018
  • May 2018
  • July 2017
  • January 2017
  • December 2016
  • January 2016
  • June 2015

Categories

  • Cloud Computing
  • Collaboration Technology
  • Cyberattack
  • Data Breach Response
  • Data Protection Laws
  • Data Security
  • Device Security
  • Education Industry IT
  • Email Environment Security
  • General Information
  • Hacker Prevention
  • Incident Response Plan
  • Informaton by Industry
  • Intrusion Prevention
  • Malware
  • Malware Incident Response
  • Mobile Devices
  • MSSP
  • Natural Disaster Preparedness
  • Network Health Check
  • Network Remediation
  • Network Security
  • Network Visibility
  • Overview
  • Penetration Test
  • Private Cloud
  • Role-based Access Control (RBAC)
  • Rootkit
  • Runbook
  • Secure Data Storage
  • Uncategorized
  • White Papers
  • White Papers on Accountant and Business Finances Solutions
  • White Papers on Cisco Firepower
  • White Papers on Cisco Meraki Solutions
  • White Papers on Cisco Systems
  • White Papers on Cisco Webex
  • White Papers on Healthcare IT Solutions
  • White Papers on Law Firm Data Security
  • White Papers on Technology that Automates

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

SEARCH

Search Our Solutions

  • IT Security
  • Managed Services
  • Cloud Hosting
  • Collaboration

Search Our Partners

  • Apple
  • Cisco Meraki
  • Cisco Systems
  • Cisco WebEx
  • Dell Partner
  • Fibertown
  • Microsoft
  • StorageCraft
  • VMWare
  • Western Digital

Resources

  • Affiliations
  • Blog
  • Demos
  • TAGITM
  • Utilities
  • Video
  • White Papers

Certifications

Cisco Firejumer Pros Located Here!

FIRE JUMPER PROS LOCATED HERE!

Connect With Us!

(281) 651.2254
ALL CONTACT INFO
CUSTOMER PORTAL

Distinctions

Goldman'Sachs 10,000 Small Businesses


HUB ID: 1272954107300

DIR contract holder for all Cisco Solutions

 

Contract Number: DIR‐TSO‐4252

  • Facebook
  • Twitter
  • Instagram
  • RSS
Copyright © 2010 – 2019. All Rights Reserved.