(844) 982-6824 

New HSI CPR, AED, and First Aid course available to businesses and general industry

Last updated on

Email security guide

Practical email security advice for small businesses, organizations, and everyday users

For those who need a little email sanity and easy-to-understand email security advice Which of these sounds most like your email habits? I use one or two email addresses in a web browser (like Gmail) I use multiple email addresses in an email application (like Outlook) I use multiple email addresses in a never-ending dystopia… Continue Reading Practical email security advice for small businesses, organizations, and everyday users

Continue Reading
Hackers you know

Like domestic and child abusers, the “hackers” are likely someone you know

Do you know what’s wrong with these? We’ve all seen these in our Facebook and social media feeds. They seem harmless and ask questions like: Where did you grow up? What’s your favorite color? First pet’s name? Street you grew up on? Favorite food? What’s your high school’s mascot? Favorite band? What elementary school did… Continue Reading Like domestic and child abusers, the “hackers” are likely someone you know

Continue Reading
Spear Phishing Emails

Spear phishing can originate from your website and social media

Spear phishing is a one-to-few or one-to-one kind of attack. Companies and groups with a public directory or staff listing on their websites have probably encountered one of these in the past. A common spear phishing attack works and looks like this: Let’s assume the email address mary.smith@myorg.org looks valid to you and you recognize… Continue Reading Spear phishing can originate from your website and social media

Continue Reading
Spotting email threats

Attachments and spotting malware

The days of sending and receiving viruses—literal virus files designed to spread across your computer—aren’t dead, but for most people it’s unlikely. Most built-in systems are very good at detecting threats. But it is still possible. Here are two file attachments. Which one seems okay to you? The one on the right has a period (.)… Continue Reading Attachments and spotting malware

Continue Reading

We've worked with these and dozens of other partners across the U.S.