Types of Social Engineering

Greg Edwards

As the CEO of WatchPoint, I believe marketing our products is an extremely important part of the success of our business. We want our customers to be aware of the many ways we can protect their…

Read More

How To Start Your Own Insurance Business

Jordan Kadlec

At different points in life, we all feel like we would thrive in the business and entrepreneurship sector. But, the drawback sets in when it is time to decide the right business for your personality.…

Read More

How to Protect Personally Identifiable Information from Ransomware Attacks

Chris Hartwig

Personally Identifiable Information (PII) is defined as any information that can be used on its own or combined with other information to identify, contact or locate an individual. This can include…

Read More

Eastern European Bank Robbers Nab $4m in 3 Days with GozNym Banking Trojan

Mark Warner

When the average end user discovers an injection on their system it’s more or less treated as a minor annoyance. They’ll receive a prompt - “Your Antivirus has detected (bad stuff)” and was…

Read More

Small Businesses Becoming Big Targets

Jordan Kadlec

The latest Government Security Breaches Survey found that nearly three-quarters of small organizations reported a security breach in the last year (2015) which is a 13% increase from the 2013 and…

Read More

Cyber Monday brings Cybercrime

Greg Edwards

Long lines, chilly weather, leftover turkey sandwiches, and Black Friday go hand in hand. Black Friday shopping isn’t going away anytime soon, but Cyber Monday is challenging brick and mortar…

Read More

LifeLock: 100% Not Guaranteed

Michael Collis

 Do you recall those eye catching ads for LifeLock? You know, the ones where CEO Todd Davis publishes his own Social Security number on the side of a truck and dares anyone to steal his identity?  Of…

Read More

Pick up the phone! $2.5 million dollars is on the line!

Chris Hartwig

 I received a call last week that originated from the small island nation of Jamaica. Normally I have a policy of not answering numbers that are not in my contact list, but I made an exception for…

Read More