877.603.8818 info@gdrgroup.com

Your Weak Cyber Security Violates Federal Law

Reuters just made me aware of a U.S. Securities and Exchange Commission report about a recent SEC investigation if nine companies that had been victims of CEO fraud had sufficient internal controls in place as required by law. The report focused on what the FBI calls...

Replica Phishing Sites Prey on User Trust

Attacks leveraging look-alike federated logon pages are more dangerous than malware-laden attachments in email. As you build out your security strategy to prevent successful cyber-attacks, much of it focuses on stopping malware attempting to enter via email-based...

Everyone’s Cyber-Worried; No One’s Cyber-Prepared

New data from the 2018 Chubb Cyber Risk Survey shows people and companies have a false sense of cybersecurity and aren’t really doing much about it. It’s a safe assumption to think that most everyone is very much aware of cyber threats, phishing attacks, ransomware,...

Creating a User Sensor Network to Stop Cyber-Attacks

If your users aren’t trying to protect corporate data and assets, you’re at risk. What you need is for the user to become an integral part of their security measures. In every attack that involves phishing, spear phishing, vishing, smishing, drive by downloads, etc.,...