by Katherine Parker | May 14, 2019 | Cyber Fraud
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We have come to the fifth and final genre of BEC identified in the FBI’s 2018 Internet Crime Report. This final type is one that shares many elements with Account Compromise because...
by Katherine Parker | May 13, 2019 | Cyber Fraud
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation According to the FBI’s 2018 Internet Crime Report, Business Email Compromise (BEC) is the most successful method used to gain unauthorized access to networks. Techniques to do this...
by Katherine Parker | May 10, 2019 | Cyber Fraud
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation We continue our look at the five kinds of Business Email Compromise (BEC) attacks that impact business. According to the 2018 Internet Crime Report produced by the FBI, the BEC...
by Katherine Parker | May 9, 2019 | Cyber Fraud
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation Protecting a business network from the multitude of cyber threats out to compromise a network means getting to know the bad actors who create them, what attack vectors they employ,...
by Katherine Parker | May 8, 2019 | Cyber Fraud
Data Theft Scam CEO Fraud Account Compromise The Bogus Invoice Attorney Impersonation It seems a new name of a new ransomware is making the rounds every week, and cybercrime is forever on the rise. How can a business protect its network from the multitude of viruses,...
by Katherine Parker | May 1, 2019 | Cyber Fraud
IT News Brief May 2019: What the FBI’s just-released 2018 Cybersecurity report reveals about the latest trends of cyber crime; the results may surprise you. How to secure your network by simply training your staff to recognize threats, and a little information...