Holiday Season Cybersecurity: 3 Online Shopping Scams To Look Out For
Every year, the holiday season proves to be the busiest couple of months for essentially everyone, even for cybercriminals and their online shopping scams. In fact, we could say âespecially for cybercriminals.â Thanks to online shopping trends, an annual spike in online activity between November and December presents a field
Read morePhishing Attack Update: How Cybercriminals Can Bypass Email Scanners to Attack Your Business
Email scanners are an important piece of technology used to automatically detect and reroute potential threats (like a phishing attack) that attempt to infiltrate your inbox from unknown and/or suspicious sources. If youâve ever had to âcheck your spam folder or quarantineâ after a trusted source has sent you a
Read moreBuying Bitcoin? Watch Out for These Common Phishing Attacks
You donât have to look far to see that interest in bitcoin is on the rise and in the news more and more every day. All this talk of âwallets,â âmeme coins,â and âminingâ is sure to have caught your attention at one point or another, leading you to wonder
Read moreBeware of These Google Docs Scams
Does your organization use Google Docs to accomplish work? Do you frequently send and receive documents to and from people outside of your organization? If you answered âyes,â then you might be at risk for another new phishing scam that exploits another familiar tool that your team is accustomed to
Read moreBreaking Down Cybersecurity with Blue Layer: What is Spear Phishing?
If youâre a frequent visitor to the Blue Layer blog, then youâve likely become quite familiar with phishing and are quickly becoming an expert at identifying what it looks like. Today, weâre expanding that base of knowledge by digging deeper into a specific brand of phishing called âspear phishing.â First,
Read moreIs Your Business at Risk of a Vendor Email Compromise (VEC)?
It never fails: just when you feel like you have a grasp on current cybercrime trends, hackers are already coming up with something new that you have to worry about protecting yourself from and educating your employees about. This week, weâre talking about vendor email compromise (VEC). What is a
Read moreCybersecurity Alert: Beware of Video Verification Deepfakes
Try, for a moment, to remember a time before deepfakesâwhen technology had not yet allowed us some of the everyday conveniences that we enjoy today: when you could not order things and receive them the same day; when you could not have a face-to-face conversation with anyone, anywhere at the
Read moreWhat You Need to Know About MFA & How to Hack It
It might be difficult to remember a time before MFA when you didnât have to receive a text or email code beyond a normal password to get access to your accounts. But once upon a time, logging in was as simple as 1.) identity 2.) password 3.) entry. The evolution
Read moreHow to Protect Your Business from the Most Common Form of Attack: Phishing
Phishing is no new topic in the Blue Layer blog, and if youâve been with us at any point in the past, then itâs likely that youâve been with us as weâve explored the dangers of phishing. And at this point, the most prevalent form of cyber attacks is something
Read moreZoom Phishing: Are Your Remote Employees Protected?
The COVID-19 pandemicâs impact on the workplace is something that no one could have seen coming. For many businesses, a typical day at the office has become a thing of the past now that everyone has been sent home, computers and coffee in-hand. But working from home quickly presented cybercriminals
Read more