BLOG

FBI Warning: Email Scam to Steal Your Direct Deposit Paycheck

FBI Warning: Email Scam to Steal Your Direct Deposit Paycheck

We all get the emails, notices, and news alerts. Don’t open that attachment. Don’t open that link. Don’t do this, don’t do that. But until you click that button and feel the overwhelming dread and despair of, what have I done, do you fully get the picture. In a...

National Cybersecurity Awareness Month 2018

In an effort to combat sensitive data breaches and preserve American online privacy, the National Cybersecurity Alliance (NCSA) and U.S. Department of Homeland Security (DHS) designate October as National Cybersecurity Awareness Month (NCSAM). Since its inception 15...

An Ominous Warning About Wiper Malware

For more information on Wiper malware and other malware threats, call (877) 369-1831 or email us at info@dfcyber.com. You Might Find These Articles Interesting: Wiper Malware a Disastrous Threat Risk and its Evaluation – Free White Paper What is Brandjacking? – Video...

Wiper Malware A Disastrous Threat

With new forms of cyber attacks coming out seemingly every day, the Wiper Malware tends to lurk in the background of everyone's memory until it strikes again. Due to the less than likely hood of a wiper malware attack, many don’t take it as seriously as they should or...

The Human Factor in Cybersecurity

According to the Kaspersky Lab's State of Industrial Cybersecurity 2018 survey, nearly half (49%) of organizations in all sectors faced critical security consequences due to human error. Whether that error resulted from a phishing scam or clicking on a malicious link,...

Phishing-Look for these Warning Signs

Don’t be hooked! Phishing is a method used by scammers to steal information through social engineering and fraud. The information stolen can be used for simple monetary gain or even up to identity theft. Spear Phishing Spear Phishing is a direct and targeted form of...

August 2018 Cybersecurity Recap Video

August was full of cybersecurity concerns that could affect both organizations and consumers. In the August report we look at, the hack on T-Mobile, Air Canada's data breach, a new Chrome bug, and the Apple vs Facebook VPN debacle. For more information on...

Your Voice and Cybersecurity: Part One

As technology advances and voice activation is added to practically every device, a serious conversation needs to happen. With new technology comes new threats and voice-activated devices are no different. While many companies strive to patch problems as soon as they...

What is HIPAA? A Video Overview for Patients

For more information on HIPAA or compliance, call (877) 369-1831 or email us at info@dfcyber.com. You Might Find These Articles Interesting: Risk and its Evaluation – Free White Paper The Human Factor in Cybersecurity What is Brandjacking - Video Tips for Guarding...

What is Brandjacking? A Video Overview

For more information on brandjacking or phishing, call (877) 369-1831 or email us at info@dfcyber.com. You Might Find These Articles Interesting: The Evolution of Risk Management Phishing – Look for These Warning Signs Infographic July 2018 Cybersecurity Recap...

Tips to Guard Against Brandjacking

Brandjacking: The unauthorized use of a company’s brand or online identity for the purpose of acquiring their brand equity. This might seem more like a marketing topic, and it is on the surface level, but under the guise of a general nuisance lies something far more...

What is Risk? A Video Overview

For more information or to speak with our Advisory Services Division, call (877) 369-1831 or email us at info@dfcyber.com. You might find our latest white paper helpful. Download it free...

The Evolution of Risk Management

Risk evaluations along with risk management are a must for any organization who wants to thrive in today's market. As many organizations grow and move into different geographical locations, additional considerations targeting specific locational risks need to be taken...

HHS wall of shame

Find out who is non-compliant and how to stay off the naughty list

Blog

Read up on what's happening in the compliance realm

Report a Breach

Engage our cyber defense team

Forge LMS

Take a look at our other services