Masthead08

Blog

dcinno-graphus-feature

DCInno Profiles Graphus, “The Cybersecurity Startup Out to Simplify Security Solutions”

In a recent DCInno article featuring Graphus, staff writer Samantha Sabin spoke with CEO and co-founder Manoj Srivastava on how the company...

difference-between-phishing-spear-phishing-social-engineering

The Difference Between Phishing, Spear Phishing and Social Engineering

There are many differences between phishing, spear phishing and social engineering attacks, but they are often used interchangeably and incorrectly. That...

graphus-white-paper-all

New Report on Spear Phishing and Social Engineering Risks and Best Practices

People are your weakest link. That is what the data tell us about cybersecurity risk today. Every day there are more...

how-to-lose-your-employee-w-2-feature

How to Lose Your Employee W-2 Docs to Spear Phishing and How to Stop It

It’s tax season. That means cyber attacks are in high gear. A trend that started last year and has increased in...

yahoo-hack-social-engineering

Social Engineering Likely Cause of Yahoo! Hack

The FBI believes that the massive Yahoo! breach started with either a social engineering or spear phishing attack on privileged users...

graphus-cybersecurity-product-launch-2

Graphus Announces Automated Protection from Social Engineering, Spear Phishing, and Malware Attacks for G Suite Users

Reston, VA – March 15, 2017 – Graphus, a cybersecurity company that automates protection from social engineering, spear phishing and malware attacks,...

five-agonies-feature-01

The “Five Agonies” of Social Engineering Cyber Attacks

A 2016 survey by Information Security Media Group found that 60% of businesses suspected they were targets of social engineering attacks...

OLYMPUS DIGITAL CAMERA

LA Hospital Pays Cyber Ransom

Cybersecurity experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a...

Information assurance prevents personally identifiable information from being stolen by cyber criminals that could impede the mission and cost the Air Force money. The Airmen of the 22nd Communications Squadron information assurance office help protect Team McConnell’s cyber communications on base. (U.S. Air Force photo illustration/Airman 1st Class Christopher Thornbury)

If you see something, say something!

According to FISMA 2014 report 69% of cyber incidents reported by private sector to US CERT are phishing related.

cyber

Cyber-Espionage: If you were a victim, how would you know?

Cyber-espionage in the U.S. has escalated to unprecedented levels. According to Verizon Data Breach Investigation Report 2015, the most affected industries are