Search
Close this search box.
Search
Close this search box.

Phone Scam Breakdown: The IRS Scam

The first step in protecting against phone scams is understanding how they work. That’s why in this series, we’re breaking down some of the newest and most popular phone scams circulating among businesses and consumers. The Scam Ah, tax day. The chore of rounding up your W-2’s and taking them to your accountant to look […]

Phone Scam Breakdown: Employee Impersonation Scam

The first step in protecting against phone scams is understanding how they work. That’s why in this series, we’re breaking down some of the newest and most popular phone scams circulating among businesses and consumers. The Scam You’re a call center representative for major telecommunications carrier. Days are pretty easy, you help customers troubleshoot problems […]

For Attackers, Knowledge is Power

The password is among the oldest security artifacts that we have. It was in use for thousands of years, mainly in military applications, before some misguided soul had the idea to use a password for authentication on a computer system. We all know how that’s worked out. In the decades since then, things have not […]