It can be a real head-scratcher when one of your otherwise well-performing employees routinely falls for the simulated phishing attacks that you roll out as a part of your cybersecurity awareness strategy. For all intents and purposes, the person is a great employee,...
In the late 1970s and early 1980s, Bell telephone companies were making a mint off of offering the ability to call your friends and family that lived outside your predefined region, charging up to $2 per minute (during peak hours) for long distance calls. The problem...
Employees are a critical part of an organization’s defense against many IT security threats. Just as having the correct technology solutions is important, training personnel to recognize security threats is a critical part of any security strategy. As part of that...
Many Microsoft PC users are experiencing a nuisance scam that freezes their browser and offers an immediate solution, “Call Now!”. This may appear legitimate at first, and there are several different versions of this same scam, so it’s on the user to...
Getting people comfortable in a group setting before a team meeting can be the best investment of ten to 15 minutes of time that you can make. Ice breakers get creative juices flowing, can increase the exchange of ideas, establish team identity, and create a sense of...