Watch Out for Wire Transfer Fraud

Wire transfers are a standard practice for businesses and consumers to exchange funds. But watch out: Wire transfer fraud has risen dramatically, so it is critical that you and your employees understand the risks and become better prepared to protect your business from this pervasive threat. What is wire transfer fraud? Wire transfer fraud occurs when a threat actor poses as a trusted authority, such as a …

What Are Business Email Compromises?

Business Email Compromises (BEC), also known as Email Account Compromises (EAC), pose a significant threat for businesses. These scams primarily target companies through email: The criminals behind BEC scams often act as trusted sources, such as company owners and executives, coworkers, vendors, or clients. They send emails that appear to be legitimate requests for sensitive and confidential information, or even a transfer …

Did You Know There’s a Better Way to Select Items on Your iPhone?

Your iPhone is full of hidden controls and features you may or may not have stumbled upon over the years. Apple doesn’t really pack a traditional user manual with each iPhone it ships, so we really pick up how to use these things ourselves. One of those features is selecting items. If you never select items, these gestures will be …

Email Isn’t Always Secure (but It Can Be)

Usually, it’s good advice to keep sensitive and private information away from email. If you need to share confidential business information with a colleague, there are typically more secure ways to send that data off. However, email can be a secure messaging platform, so long as it’s set up correctly ahead of time. Why is email usually not secure? The …

How SEO Poisoning Can Threaten Your Business

When you want to look something up on the internet, you turn to a search engine, like Google or Bing. However, not all links are relevant, or even legitimate. Bad actors are devising ways to trick you into clicking on search results that lead to malicious websites, whether to obtain your information or install malware on your machine. They achieve …