Gone Phishing: How Email Became The Weakest Link

July 11, 2019

Phishing has grown into a sophisticated form of cyber crime, and email has become the weakest link. By being disguised as an important message or trusted individual, these cyber attackers are able to steal private data or cause viruses that convince victims to provide them money. One in every 99 emails is a phishing attack, and in a five day work week this amounts to 4.8 phishing emails per employee. With their mimicking of reliable companies such as Microsoft, Netflix, Facebook, and more, businesses could be receiving attacks everyday and not know it.

Spotlight

Northrop Grumman M5 Network

Northrop Grumman is a leader in all aspects of computer network operations and cybersecurity, offering innovative solutions to help secure the nation’s cyber future. The company’s decades-long expertise cuts across every sector: intelligence, Defence, civil, state and local, and commercial. Northrop Grumman acquired M5 Network Security in 2012 . M5's core business develops and manufactures secure network communications solutions for Defence departments, governments, and corporate entities.

Other Infographics
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cyber Security Safety Infographic

Infographic | November 29, 2021

There is an absolute need for cyber security. The key difference, however, is that there are some organizations who have more than enough resources and the latest technology to protect themselves against attacks while others don't even know about the existence of a threat. That's where a statistical infographic comes in to serve as a guide. It educates people about the current cyber security landscape and what needs to be done in order to protect their assets.

Read More
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More
news image

Ransomware Statistics and How to Protect Your Business

Infographic | March 9, 2022

Ransomware Is One of the Most Common Malware Threats. Average ransomware payment in 2021 increased by 82% year over year to $570,000.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More

Spotlight

Northrop Grumman M5 Network

Northrop Grumman is a leader in all aspects of computer network operations and cybersecurity, offering innovative solutions to help secure the nation’s cyber future. The company’s decades-long expertise cuts across every sector: intelligence, Defence, civil, state and local, and commercial. Northrop Grumman acquired M5 Network Security in 2012 . M5's core business develops and manufactures secure network communications solutions for Defence departments, governments, and corporate entities.

Events