Scam of the Week: Ransoming Businesses Is a Successful Business

Scam of the Week: Ransoming Businesses Is a Successful Business

On Christmas Eve, cybercriminals targeted three hospitals in Germany using Lockbit 3.0 ransomware. Ransomware is a type of malicious software that infects computers and networks. It holds data and other sensitive information “hostage” in exchange for payment. If you refuse to meet their payment demands, the cybercriminals could destroy the files. Or they could make them available to the public, resulting in data theft and leaks of sensitive information.

Read More
SCAM OF THE WEEK: Post-Shopping Scams
Blog, Cybersecurity Blog, Cybersecurity

SCAM OF THE WEEK: Post-Shopping Scams

Have you finished your holiday shopping yet? Because cybercriminals are just getting started. There are thousands of shopping-themed scams this time of year, but those scams don’t end when your cart is empty. Cybercriminals continue to target shoppers with urgent phishing emails about their recent purchases.

Read More
SCAM OF THE WEEK: Unbottling the Soda Phish
Blog, Cybersecurity Blog, Cybersecurity

SCAM OF THE WEEK: Unbottling the Soda Phish

A recent phishing scam discovered by INKY researchers is an example of how well-known name brands can be used to deceive unsuspecting users. This scam begins with a seemingly harmless email from an employee at PepsiCo requesting a quote to purchase something your organization is selling and includes a malicious file attachment disguised as a Request for Quote (RFQ). An RFQ is a simple way for an organization to ask different suppliers how much they would charge for a specific good or service.

Read More
SCAM OF THE WEEK: Smishy Package Failed to Deliver
Blog, Cybersecurity Blog, Cybersecurity

SCAM OF THE WEEK: Smishy Package Failed to Deliver

Recently, cybercriminals have been impersonating postal services around the world through SMS phishing (smishing) scams. These postal services include the US Postal Service, UK Royal Mail, Correos in Spain, and Poste Italiane in Italy.

In this scam, cybercriminals send you a text message impersonating the postal service in your country. The text contains a link and says that your package can’t be delivered until you provide additional information. If you tap the link, you’ll be taken to a spoofed postal service website that prompts you to enter your credit card details so your package can be delivered. If you enter your credit card details, cybercriminals could steal your money or personal information.

Read More
5 Ways to Combine Compliance & Cybersecurity Best Practices to Improve Outcomes

5 Ways to Combine Compliance & Cybersecurity Best Practices to Improve Outcomes

Compliance and security are equally crucial for the seamless operation of your business. Although security is a prime component of compliance, compliance is not the same as security. Both are interconnected but still different.

While compliance helps your business meet industry or government regulations, security protects the integrity of your business and its sensitive data.

Read More
SCAM OF THE WEEK: Duolingo Data Leak

SCAM OF THE WEEK: Duolingo Data Leak

Duolingo is a popular online language learning platform that allows users to learn languages and earn certifications. Recently, Duolingo was involved in a data leak, in which cybercriminals stole the names and email addresses stored on the platform. That means 2.6 million users have been impacted by this data leak.

In the coming months, we expect to see an influx of cybercriminals using phishing scams to try to take advantage of Duolingo’s data leak.

Read More
8 Elements of a Business Impact Analysis for Compliance

8 Elements of a Business Impact Analysis for Compliance

A compliance program helps businesses like yours minimize risk and increase business efficiencies. It also ensures that your business complies with relevant laws and industry regulations.

An essential element of an effective compliance program is Business Impact Analysis (BIA). It measures the impact of a disruption (due to an accident, disaster, etc.) on critical business operations.

Read More
SCAM OF THE WEEK: X Marks the Spot for Cybercrime
Blog, Cybersecurity Blog, Cybersecurity

SCAM OF THE WEEK: X Marks the Spot for Cybercrime

The social media platform Twitter recently announced that the platform would be renamed and rebranded as “X”. As a result, the monthly subscription for a blue verification checkmark will be renamed from "Twitter Blue" to "X Premium.” Cybercriminals view major platform changes like these as an opportunity to try to exploit uncertainty and steal your sensitive information.

Read More