Articles

How Dark Web Malware Marketplaces Turn Low?Skill Criminals Into High?Impact Threats

The DOJ takes down a malware marketplace. We comment on dark web marketplaces that package malware, infrastructure, and support for novice criminals and outline how organizations can counter this expanding threat.

Read More
Threat Mapping: Connecting Daily Work To Cyber Risks

A survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.

Read More
Stopping Ex-Employees From Logging In: A Practical Playbook For Employers

A survey reveals ex-employees are still using passwords. We comment on concrete measures such as MFA, access reviews, and verification testing, which can help prevent past employees from silently retaining or regaining access to company systems.

Read More
Why Online Criminals Target Business Tools And Productivity Apps

We comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.

Read More

Latest

How Dark Web Malware Marketplaces Turn Low?Skill Criminals Into High?Impact Threats

The DOJ takes down a malware marketplace. We comment on dark web marketplaces that package malware, infrastructure, and support for novice criminals and outline how organizations can counter this expanding threat.

Read More
Pay Rage And Employee Theft: When Missed Raises Or Value Slights Lead To Fraud

A former employee claims he started stealing after he did not receive a raise. We comment on how perceived pay inequity can fuel rationalizations for employee theft, and look at the value of controls and communication strategies to help reduce the risk.

Read More
What Is More Important - Pay Or Flexibility? You Make The Call

A survey reveals pay may be more important than flexibility. What do you think?

Read More
Threat Mapping: Connecting Daily Work To Cyber Risks

A survey reveals IT personnel are unable to effectively "threat map", which leaves them vulnerable. We comment on how linking routine tasks to specific cyber risks (threat mapping) empowers employees to recognize danger and help limit loss.

Read More
Discovering False Invoices Before The Money Walks

A former health commission CEO pled guilty to wire fraud. We comment on practical ways to spot forged or altered financial documents so losses are stopped before they are drained from your organization.

Read More