Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks

Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks

New data from phishing detection vendor Inky highlights which brands are most often used by cybercriminals in phishing attacks that will give them the edge needed for a successful phish. If you... Read more »

Optrics Insider – How to Stay Safe Against Phishing Attacks & Social Engineering

 Join Scott Young from Optrics Engineering and  Mike Brill from KnowBe4 as they discuss the latest Zoom phishing attacks  and social engineering and how best to keep you and your staff... Read more »

Running Headfirst Into a Breach

The pandemic changed the fortunes of many organisations. Perhaps none so much as Zoom, which has found itself becoming a noun synonymous with any form of video call. However, its meteoric rise... Read more »

It’s Not Only About the URL

You have to look at the totality of an email to determine whether it is a phishing attack or not. I’ll admit it, I’m guilty. When I get a phishy-looking email, the... Read more »