Articles

Beyond The Click: Building Employee Vigilance To Prevent Phishing Attacks

We explore proactive security behaviors critical to reducing phishing attacks and forming a frontline defense to protect organizational data and systems.

Read More
Rise Of The Impostors: How Employees Can Thwart Tech Support Scams On Workplace Collaboration Tools

We discuss strategies for employees to resist sophisticated tech support scams by practicing verification and adherence to IT policies.

Read More
Exorcising PLAYFULGHOST: How To Defend Your Network Against The Latest Stealthy VPN Malware

Learn the origin and evolution of the PLAYFULGHOST malware and practical steps to protect your devices and organization from this advanced cyber threat.

Read More
Gaming Engine Malware: How Employers Can Block The Next Wave Of Cyber Attacks

We review a new malware risk and how employers can guard against cross-platform malware campaigns that exploit open-source game engines.

Read More

Latest

Guarding Against Internal Crypto Crimes: Strategies For Organizational Resilience

We review how internal controls, transparent governance, and risk assessments can help organizations prevent internal crime and embezzlement in crypto operations.

Read More
Controlling Vendor Master Data To Block Fraudulent Payees

We comment on how organizations can design and enforce stronger vendor, data, and payment controls to prevent funds being misdirected to entities that appear related, but are not.

Read More
Are Workers Less Attached To Their Jobs? You Make The Call

Gallup research claims workers are not engaged at work and have dubbed it the "Great Detachment". What do you think?

Read More
Beyond The Click: Building Employee Vigilance To Prevent Phishing Attacks

We explore proactive security behaviors critical to reducing phishing attacks and forming a frontline defense to protect organizational data and systems.

Read More
Beyond Restitution: Leveraging Civil Lawsuits In Embezzlement Cases

We explain why organizations should consider not abandoning civil litigation alongside criminal proceedings when a wrongdoer's assets may allow direct recovery of embezzled funds.

Read More