by Katherine Parker | May 31, 2019 | Data Security, Device Security, Email Environment Security, General Information, Mobile Devices, Network Security, Uncategorized
Recognizing Those Trouble-Making Emails and Stopping Them in Their Tracks Spoof Spotting Transcript and Slides:Hello! My name is Katherine Parker. I represent Secure Networkers, a business dedicated to help businesses navigate through the often perilous terrain of...
by Katherine Parker | May 29, 2019 | Cloud Computing, General Information, Natural Disaster Preparedness, Secure Data Storage
IT News Brief June 2019: Hurricane season is our annual reminder that all Southeast Texas businesses have to consider how to manage business operations remotely, and what would be the best disaster recovery solution to employ in the event a hurricane heads our way....
by Katherine Parker | May 14, 2019 | Data Security, Email Environment Security, General Information, Uncategorized
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We have come to the fifth and final genre of BEC identified in the FBI’s 2018 Internet Crime Report. This final type is one that shares many elements with Account Compromise because...
by Katherine Parker | May 13, 2019 | Data Security, Email Environment Security, General Information, Uncategorized
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation According to the FBI’s 2018 Internet Crime Report, Business Email Compromise (BEC) is the most successful method used to gain unauthorized access to networks. Techniques to do this...
by Katherine Parker | May 10, 2019 | Data Security, Email Environment Security, General Information, Uncategorized
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We continue our look at the five kinds of Business Email Compromise (BEC) attacks that impact business. According to the 2018 Internet Crime Report produced by the FBI, the BEC...
Recent Comments