article thumbnail

Webinar: IS IT TOO COLD FOR PHISHING? on February 24, 2022 via ARMA NOVA

IG Guru

Phishing is on the rise and cybercriminals are getting better. The post Webinar: IS IT TOO COLD FOR PHISHING? Thurs, February 24, 202211:30 AM – 1:00 PM ET Northern Virginia has faced some cold weather along with a surge in COVID, but that’s not the only thing.

article thumbnail

Why you should train your staff to think securely

IT Governance

Staff need regular training on information security practices to ensure they’re aware of the risks they face on a daily basis. The vast majority of malware is spread by drive-by downloads and phishing campaigns, both of which exploit human error. People, processes and technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. These apps can steal user information, attempt to extort money from users, gain access to corporate networks, force users to view unwanted ads, or engage in other undesirable activity types. Phishing Type.

Phishing 105
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Therefore, organizations must protect themselves from cyber risks and attacks such as: Denial-of-services (DoS) and distributed denial-of-service (DDoS) Phishing and spear phishing Man-in-the-middle (MitM) SQL injection Cross-site scripting (XSS) Ransomware. Information Governance Body of Knowledge (iGBoK), 1st ed.,