Got a billion-dollar IT budget? Got the best Microsoft cybersecurity tools money can buy? Got teams and teams of IT staff who proactively monitor lights blinking on servers and charts on screens looking for cybercriminal activity within your network?
[If you are a routine kind of person, stop reading here. If you consider yourself to be less bland, I challenge you to read to the end.]
We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).
You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.
You may be barricaded inside the best of (fire)walls, but you could still be exposed by your recipients’ nostalgia for their memorable passwords. Joseph Heller, author of Catch 22, famously wrote that “just because you’re paranoid doesn’t mean they aren’t after you.” Many Generation Xers out there may recall that Kurt Cobain also used this […]
What were the top tech and e-security trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]
Only RMail offers features that can foil BEC attacks without “cry wolf” email stamps. We’ve talked a lot about the hydra of BEC (business email compromise) attacks recently due to the increasing share of these types of attacks within the universe of cybercrime that employ multiple techniques to lure users into sending money to the […]
Business Email Compromise Cybercriminal Lures Attack in Many Ways, Like a Hydra Monster with Many Heads. Each Attack Vector Needs a Defense. Enter RMail. Before we start today’s article, we’d like to ensure you have heard about – and been invited to – RPost’s Optimize!2022 global e-security and eSign user conference (click here to read […]
We’ll Make Etymology of Acronym-Originated Tech Speak Interesting… and Useful. Yes, it’s still the year of the tiger – a year of supposed unbound prosperity. But with the stock market plunging, and cybercrime flourishing, I thought it might be nice to forget about tigers and put on another hat, one of an etymologist.
The RMail security Human Error Prevention Suite Is Like Kryptonite to Deepfake Scams. By now you’ve probably heard of the deepfake phenomenon where a person in an existing image or video is replaced with someone else’s likeness. While you might think this is just a digital version of the old dye-your-hair and wear-a-fake-mustache ploy, there […]
September 22, 2023
September 15, 2023
September 08, 2023
August 31, 2023
August 25, 2023