Guardian Digital Blog

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Is this a genuine email or is it a fake designed to deceive recipients into giving up confidential information? Email is the source of more than 93% of all cybersecurity events, so having an understanding of how these phishing attacks work can prevent account takeover leading to identity theft, bank fraud, loss of intellectual property, and disruption of business operations. Many of these examples below work by tricking the recipient into clicking a link or opening an attachment. Attackers...

Comment

Email threats such as ransomware are becoming increasingly prevalent, costly, and damaging for businesses. Many organizations, especially SMBs that often experience a shortage of cybersecurity resources and expertise and lack a full-time IT department, cannot afford to mount an in-house team capable of defending against the modern cybersecurity risks they face. This lack of adequate management leaves them vulnerable to damaging, costly attacks that frequently result in data theft, financial...

Comment

Ransomware is one of the biggest cyber threats that all organizations face today. The infamous attacks on SolarWinds and the Colonial Pipeline serve as high-profile examples of state-sponsored threat actors waging increasingly sophisticated cyber-warfare. With the current conflict in Ukraine, experts predict that Russia will target U.S. financial systems and the nation’s critical infrastructure with ransomware to put pressure on the U.S. to relent on...

Comment

UPDATE: On April 20, 2022, CISA reported that the cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory (CSA) to warn organizations that Russia’s invasion of Ukraine could expose organizations both within and beyond the region to increased malicious cyber activity from Russian state-sponsored cyber actors or Russian-aligned cybercrime...

Comment

In this modern mobile era of heightened digital risk, effective email security defenses are of critical importance to the security and success of your business. Over 90% of modern cyberattacks begin with a phishing email, and threats like targeted spear phishing, fileless malware, and zero-day attacks are becoming increasingly sophisticated, and difficult to detect. A successful cyberattack can carry great costs for victims including data theft, significant, costly downtime, financial loss, and...

Comment
Gartner Research Confirms Default Email Security Is Insufficient to Combat Business Email Compromise (BEC) - Guardian Digital

Business email compromise (BEC) is a simple yet lethal attack that can have devastating effects on any business. BEC has become a favorite among cybercriminals, as these scams are simple and effective. By spoofing a trusted user, BEC requires no malware or malicious URL to convince a recipient to share valuable information or transfer significant amounts of money into the hands of the...

Comment

Must Read Blog Posts

Latest Blog Articles

Recommended Reading