article thumbnail

CyberheistNews Vol 13 #22 [Eye on Fraud] A Closer Look at the Massive 72% Spike in Financial Phishing Attacks

KnowBe4

The risk of such attacks succeeding is high, making it necessary for you to enroll users into continual security awareness training to educate them on what to look for, the techniques used, and how to spot a malicious email a mile away. mov—so online references to a file with that name could automatically link to a malicious website."

article thumbnail

RIM Month Virtual Colloquium, date and lineup announcement for April 7th 1-3pm EST!

The Schedule

A case study in creating a Getty retention compliant electronic file naming system for Procurement. Buyers could then easily name their files according to department naming conventions, and apply retention without having to take any action beyond filling out the checklist. Jennifer Thompson, J.