Guardian Digital Blog - Page No: 3

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

How To Recover from a Phishing Attack

Do you suspect that you’ve fallen victim to a phishing attack? Are concerned with the impact that it may have on your business, your productivity, and your reputation - but are unsure of how to proceed? Who should you call? Have critical email accounts or has sensitive financial information been compromised? 

Write comment (0 Comments)

In this paradigm shift for business driven by the rapid transition to a remote workforce, there appears to be a real need for a shift in securing the digital premise in order to maintain, or even enhance, business continuity and success. AT&T Cybersecurity researchers have cited a “relationship between business success and a commitment to strong security”, reporting that 91% of companies that lag in cybersecurity miss revenue goals, while 57% of companies that lead in this increasingly critical area exceed revenue goals by over seven percent. 

Write comment (0 Comments)

Phishing is the predominant modern cyber threat, and is currently undermining the security and integrity of the upcoming presidential election. Tensions surrounding the 2020 presidential election are higher than ever - presenting cyber thieves with the perfect environment to launch dangerous, timely phishing attacks designed to steal sensitive credentials and large sums of money from victims.

Write comment (0 Comments)

It is no secret that 2020 has been a year of rapid transformation for businesses. Companies worldwide have been forced to quickly become more digital in the way that they operate, and many have transitioned to a largely remote workforce. Businesses have become increasingly reliant upon inherently insecure cloud platforms like Office 365 and G Suite to fulfill their communication and collaboration needs. While these changes have introduced certain advantages in terms of efficiency and productivity, they have also brought on significant challenges - namely, effectively securing cloud email in this increasingly complex and dangerous threat environment.

Write comment (0 Comments)

Whether it’s the mask we wear when running errands or the bottle of hand sanitizer we now carry with us at all times, we are constantly reminded of the increased physical risk we face daily due to COVID. However, our health is not the only thing that has been threatened by this pandemic. The email threat landscape has remodeled how we work over the past six months - leaving businesses, users and critical data at heightened risk. 

Write comment (0 Comments)

In our recent blog post Think Like A Criminal: How To Write A Phishing Email, we examine phishing from the eyes of an attacker to help you understand and protect against this notorious email scam that is to blame for over 90% of all cyberattacks. In this article, we briefly touch on social engineering - or techniques that attackers employ to manipulate psychology. Considering 98% of all cyber attacks rely on social engineering, we want to provide readers with more information on the topic and advice for protecting against social engineering attacks. Here is what you need to know about social engineering in 2020.

Write comment (0 Comments)

Six months into this unprecedented pandemic, there has been a seismic shift in the way businesses operate. With a large portion of the global workforce now working remotely, email use for business communications is at an all-time high - and so is the digital risk that users and organizations face online daily.

Write comment (0 Comments)

Blog Articles