TechGuard Blog


Catch Email Phishing Attacks Before they Catch You

The million-dollar question is: Could you catch email phishing attacks before they catch you? Yes, it's true. A successful phishing attack costs a mid-sized company an average of 1.6 million dollars. Having the ability to recognize the signs of a...

Password Check: Are Yours Up to Par?

Most people do not put a lot of consideration into the security of their passwords. People are often concerned with their ability to remember their password, rather than the security they create. Yet, many know the risks of weak passwords and the...

Phone Fraud Taken to a New Level

Beware! There's a new level of phone fraud taking place. What would you do if you showed up for work and by 9:30 a.m. your cell phone rang between 100-150 times? Many go to voicemail but you answer some of the calls in an attempt to determine what is...

Geo-Tracking Employees: Worth the Risk?

Depending on which perspective you are viewing from, might determine whether you support the idea of geo-tracking employees' locations. Controversy over whether this type of tracking arises when considering privacy rights. If employers can video...

How to Respond to a Breach within your Company

Every day we hear of another breach and as they continue to pop up, we become less surprised. Information travels quickly. For example, consider how many stories of breached data you've heard of in the news lately. Most will remember some of the...

Business Email Compromise: Another Way In

An FBI report revealed that business email compromise (BEC) and/or email account compromise is responsible for over 12 million in fraud losses between October 2013 through May 2018. Hackers are always looking for another way to gain access to private...

Human Resource Managers Create Security-Minded Employees

Human Resource Managers have a unique position to improve the organization's cybersecurity posture. One huge mistake some organizations make in the terms of cybersecurity is leaving the responsibility to the IT department alone. Human Resource...

USB Drops: Would your Employees Take the Bait?

You're walking to your car and you find a USB in the parking lot next to your car. There's also a couple keys attached. Would you take the bait? Would the Good Samaritan come out in you? Or are you just a curious person?  Could you resist the...

Are Internet of Things Devices Invading your Privacy?

We all know someone who has all the latest tech gadgets. Technological advances provide endless options to make our lives easier and to help us work smarter not harder.  All of these tech gadgets connect to computer-based systems and exchange data. ...

Vishing: Watch out for Scare Tactics

Vishing is a common method of social engineering. Think about how many times you've received an offer over the phone that sounded too good to be true. For instance, just last week I listened to a voicemail from a relative insisting that legal action...

PCI Compliance Leads to Increased Sales

According to the 2017 Verizon Report, 80% of organizations are still not compliant with PCI DSS (Payment Card Industry Data Security Standards) and only 29% of them are compliant one year after validation. With technology moving quickly, compliance...

What is IT Security worth without Physical Security?

If  your organization has a high standard of IT security but is lacking in physical security, then the risks and vulnerabilities are high. There's so much to protect from human safety, private information, physical assets, and more. Protecting your...

 


 

Read More Articles →