Security Articles

Funds Transfer Fraud: How It Works & How to Prevent It

Funds Transfer Fraud: How It Works & How to Prevent It

Funds transfer fraud (FTF) is a common and relatively simple online crime that's becoming increasingly costly and more sophisticated.Incidents and initial losses have skyrocketed by 78% since 2020—averaging $388,000 per attack—and the window to recover stolen funds...

How to Build an Information Security Program?

How to Build an Information Security Program?

Information Security is intimidating, and as a result, many people or companies take the path of avoidance or complacency. Today we want to take it back to the basics around what it takes to build an information security program, or as it is more commonly referred to an InfoSec Program.

Cybersecurity Acronyms: The Ultimate List 2024

Cybersecurity Acronyms: The Ultimate List 2024

Are you lost in a sea of cybersecurity acronyms? Have you been asked if your company utilizes EDR, SOC or SIEM but had no clue what that actually meant? If you find yourself nodding your head at the last two sentences, this blog post is for you.