Cyber Security Articles & News

Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result in the loss of thousands of dollars for your business, a breach in your data, potential damage to your reputation, and loss of customers. 

Read More >
Mitnick Security: Phishing Awareness Training

Phishing emails are one of the most common social engineering techniques used by threat actors today due to such high success rates. About 3.4 billion phishing emails are sent every day, having cost victims worldwide roughly $50 billion in losses according to the FBI. With this in mind, it’s important you and your team have the proper training in place to recognize and report a phishing email in order to avoid compromising your network, data, business, and reputation. 

Read More »
Mitnick Security Training: QR Code Cybersecurity Test

Nearly 90 million smartphone users in the U.S. alone have used QR codes on their mobile devices. By 2025, that number is projected to grow to 100 million. As people have become more comfortable using QR codes, threat actors have begun using them to find yet another way to steal credentials and access sensitive information.

Read More »
Celebrating National Social Engineering Day

August 6th, 2024, marks the first annual National Social Engineering Day, an opportunity to raise awareness about social engineering threats and emphasize effective cybersecurity practices. 

Read More »
The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer. This means testing that directly simulates a threat actor’s processes and attack patterns.

Read More »
Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read More »
How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the next step is.

Read More »
Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read More »
Password Management Best Practices: How Secure Are Password Managers?

Password managers are convenient tools for storing, organizing, and accessing passwords. But are they safe from cyber attacks?

Read More »
Red Team Testing vs. Penetration Testing

As the cost of cyber attacks continues to grow — in 2023, the worldwide cost of cyber attacks reached $8 trillion and, by 2025, the total cost is estimated to hit $10.5 trillion — now is the time to prioritize cybersecurity testing for your organization.

Read More »