Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who conduct wire transfers, especially those with suppliers abroad.   The [...]

Read More

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to [...]

Read More

Air Gap Data Protection

Among all the methods for securing digital data, the policy of air-gaping is certainly the most extreme. Drastic Measures As it’s name would imply, air-gaping is a security protocol that physically isolates a machine from a network.   Air-gaping most commonly involves cutting off a computer from the World Wide Web, [...]

Read More