RESEARCH

Smishing: The Cyber Scam That’s Hitting Your Phone Right Now

Posted by cchahine On
Smishing: The Cyber Scam That’s Hitting Your Phone Right Now

My phone goes off. A text from a number I don’t recognize: “I’ll be late for lunch.”  I pause. Do I respond? Who is this? Maybe it’s a coworker. A friend. A client. But here’s the truth: It’s not. It’s ...

Cyber Compliance

Cyber Liability

Insurance & MSP Liability

More Articles

Cyber Liability Is Coming for You: Here’s How to Stop It

Where were you on New Year’s Eve 1999? If you were in IT, you probably remember holding your breath, waiting to see if Y2K would bring down the world’s computer systems. It didn’t happen, but the new millennium still had ...

Third-Party Integration for Google Code Assist Debuts

Your business may know that Google’s powerful AI-assisted coding platform, Google Code Assist, has a new update to make the tool even more useful and powerful. The update supports third-party integration for Google Code Assist tools, which supports faster, more ...

Would Your Users Spot This Attack? If Not, Your MSP Is at Risk

You’re busy. Your team is busy. Your clients are busy. And that’s exactly what cybercriminals are counting on. A new social engineering attack is making its way into networks across the world—and it’s shockingly simple. Here’s how it works: Step ...

Cybersecurity Complexity: Your Biggest Risk or Your Greatest Opportunity?

More than half of executives now view complexity as their biggest cybersecurity challenge, according to a recent IBM report. And with the average organization juggling 83 security tools across 29 vendors, it’s no surprise. This tangled mess of solutions doesn’t ...

AI Creates Code, Developers Remain In Charge

“AI is going to take our jobs!” “Soon, everything will be done by robots.” Statements like these have become increasingly common. Now, with the explosion of generative AI tools, there’s a sense of impending doom in some industries, spurred on ...

AI, Cyber Threats, and the Hidden Liabilities MSPs Can’t Ignore

At some point, someone will get past your defenses. It’s inevitable. Maybe it’s a phishing attack that tricks a user. Maybe it’s a zero-day vulnerability in your vendor’s software. Or maybe it’s something as simple as a weak password. The ...

The One Cybersecurity Habit You’re Overlooking That Could Save Your Business

Cybercriminals have figured out how to exploit trust at an alarming scale. For example, YouTube’s 2.5 billion users are prime targets for malicious links disguised as helpful tutorials, ads, or recommendations. The result is widespread malware infections, catching most users ...

Mastering Incident Response: Build a Winning Strategy

Has anything been more disruptive to business cybersecurity than AI’s entry into the mix? Its meteoric rise has meant that criminals possess increasingly powerful and effective tools with which to launch attacks—and businesses are prime targets. Mastering incident response is ...

Are Your End Users the Network’s Greatest Threat?

When it comes to hacking, your end users are the easiest way into the network. Hackers know it. Insurance companies know it—that’s why cyber awareness training is no longer optional. Here’s the truth: your clients think you’re already doing this. ...

Old Digital Scams, New Tricks: Stay Informed to Stay Safe

Since the Internet became an integral part of daily lives, scammers have attempted to use all sorts of networks to steal from unsuspecting victims. There aren’t any members of Royal families in need of assistance or foreign lottery winnings waiting ...

Hackers Will Hack – Will You Just Be Another Victim?

Most MSPs worry about missing an alert. Maybe the SOC will overlook something critical. Or perhaps a firewall will be misconfigured. Any one of these could let an attacker into the network. And when that happens, guess what? You’re the ...

Your Office May Be Full of Tracking Tech

Do you ever feel like someone is watching you? If you were an employee working in an office, you could trust your instincts. Many businesses are implementing tracking tech – employee tracking tools that monitor indicators like employee office use ...