Search results for: “phishing”
-
5 Things You Need to Know About Spearphishing
The FBI reports that Business Email Compromise (BEC) scams have cost companies over two billion in the past two years. Further, Aviva reports that after your company is breached, 60…
-
Security Snippets: GDPR and Royal Wedding Phishing Scams
Social engineers are opportunists, continually seeking out new and creative ways to scam users into providing personal and financial information. They’ll often develop topically relevant phishing scams around major holidays…
-
What Is Spear Phishing and Why Is It So Dangerous?
You’ve ordered a dozen times from Amazon, but one day you receive an email asking you to confirm the details of your recent order. The problem is that you haven’t…
-
Cybersecurity Awareness Month: Staying Secure in The Modern Digital World
At Netgain, we understand that cyber security is not just a catchphrase; it’s a fundamental pillar of our services as an IT-as-a-Service and managed service provider (MSP).
-
Security Principles Leading MSPs Are Following
As Netgain’s Chief Information Security Officer (CISO), I field ongoing questions regarding our security posture – not surprising given the growing intensity and frequency of cyberattacks. As a security-conscious organization,…
-
2023 MGMA New England Regional Conference – Three Key Takeaways
Netgain CISO, Kshitiij Kathurria Presenting on Cybersecurity at the MGMA Conference The Netgain Healthcare team attended and exhibited at the MGMA New England Regional Conference, “Becoming Agents of Change: Mission…
-
Cybersecurity Concerns Should Scare You Into Action
October is Cybersecurity Awareness Month and it’s no coincidence that Halloween shares the same month because both can be pretty scary. However, just like with Halloween’s haunted houses and dark…
-
Three Tips on Why Multi-Factor Authentication is Critical to Data Security
Cybercrime is rife in 2022. Kaspersky released a new report revealing a growing number of cyberattacks on small businesses so far in 2022. Researchers compared the period between January and April 2022…
-
Security Lesson #7: The Essentials of Implementing Effective Perimeter Security
As I highlighted in my first post, no company or government agency is immune to cyberattacks, and these attacks are a growing threat to every organization. To protect against these attacks, you need…
-
Security Lesson #6: What Are Endpoints and How Do You Secure Them?
In our last post, we talked about application security and how the security measures at the application level prevent data or code within the application from being stolen or hijacked.…
-
Top 5 Cybersecurity Trends in 2022: Pandemic-Level Ransomware, Talent Gap, Government Involvement, Threat Intel Availability, and more
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than…
-
Security Lesson #3: What Is Data Security (and Why It’s Important)
Data Security: Protecting sensitive data from unauthorized access In Security Lesson #1, we talked about the importance of a business impact analysis and the nine questions you need to ask…