Block Your Time to Help Block a Breach

We have spent the past few weeks focusing on security awareness training. We touched on what it is and why it is crucial. Now comes the step for action. For you and your employees to be the strongest first line of defense, you must make time for security awareness training. For as we have reiterated over and over, 95% of breaches are the cause of employee error. So the training is obviously necessary, so now time is the only barrier.

Read more

Business Email Compromises are No Myth

Real-life examples of BECs

 

If you have been following the news, you should know that we are all at risk of Business Email Compromises (BEC). You may be growing tired of hearing this fact although it is a fact that we need to keep in the front of our minds at all time! Timing is a factor that these cybercriminals are continually accessing and know how to attack when your guard is down. Below are real-life examples of BECs that illustrate how easily these attackers researched, planned and struck at the right time and were able to victimize educated, experienced business people.

Read more

Education is The Strongest Line of Defense

Business Email Compromise and Education

This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.

Read more

Business Email Compromise Attempts: How Will it Happen?

As we already discussed this month, Compromised Email Attacks (BEC) are on the rise and everyone is at risk of being a victim. It would be nice if these attacks were uniform although the attacks and the attackers come in all shapes and sizes. To better protect yourself against these types of attacks it is vital to educate yourself on the different methods these attackers are using to strike.

Read more

Compromised Emails: What are They? Are you a Target?

The global risk of compromised emails is on the rise and should be a concern of every business organization. Some industries are targeted more often, but if your business uses email, you need to be aware of the risk and what the threat entails. To understand the risk, we need first to understand what a compromised email is and how it occurs. These risks are real and have been the cause of great financial destruction for many companies.

Read more

A Few Good Tricks of the Trade

Essential Microsoft Outlook Keyboard Shortcuts

 

We at Pendello Solutions live by the motto, “do it right the first time and only do it once.” Doing it the right way never means cutting corners although it does mean doing it in the most efficient fashion possible. Many think that the only way to maneuver through Microsoft Outlook is either with a touchscreen or with a mouse and because of this, we may be missing out on a step towards efficiency. This month, Pendello Solutions will be highlighting the not very well known keyboard shortcuts to Microsoft Outlook.

Read more

Outlook Shortcuts to Give you a Smarter "Outlook"

We at Pendello Solutions live by the motto, “do it right the first time and only do it once.” Doing it the right way never means cutting corners although it does mean doing it in the most efficient fashion possible. Many think that the only way to maneuver through Microsoft Outlook is either with a touchscreen or with a mouse and because of this, we may be missing out on a step towards efficiency. This month, Pendello Solutions will be highlighting the not very well known keyboard shortcuts to Microsoft Outlook.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company