Home / Blog Articles

Blog Articles

What is Vishing?

In this digital age, we depend upon email and chat apps to communicate. We rely on social connections to help us make purchasing decisions. We book our vacations and send our loved ones’ flowers without ever leaving our homes. So, it might come as something of a surprise to find out that one of the...

What is Phishing?

Email has replaced older kinds of communication such as a written letter, fax or telegram, as the primary vehicle for commercial communication. A powerful technology that has transformed the way we do business. However, this utility comes at a cost. Email is also one of the most easily exploited ways for nefarious individuals to carry...

Shocking Email Fraud Statistics

Email fraud is the most common type of illegal activity that is enabled by the Internet. It takes many forms, from simple SPAM to full on phishing fraud. Each day, millions of fraudulent emails are sent every day. And if your company is used as the basis for email fraud, with the fraudster using your...

Protecting Your Social Media Footprint

Most of us use some form of social media in our daily lives. From sharing our current status with our friends and family on Facebook to posting selfies on Instagram. And of course, as social media has become more popular with consumers, then businesses have recognized the power that social media can deliver as a...

Brand Abuse Explained

Your company has many types of valuable assets. Everything from the actual equipment it owns, through its stock inventory, customer lists, and of course, its brand. Don’t discount the value of having a healthy brand name just because it is a non-physical asset. Just look at companies like Coca-Cola, Apple, and Microsoft, all major brands...