In his April contribution to Forbes Advisor, John Wilson discusses the anatomy of “pig butchering” scams and shares insights on how to stay safe in the crypto world.
As vishing campaigns are on the rise during tax season, John Wilson writes in Bloomberg Tax about the dangers and how tax professionals can protect themselves and their clients from cybercrime.
Safeguarding our credit and debit cards is something we all need to prioritize. In his latest Forbes Advisor article, John Wilson provides tips to keep your payment card details safe from fraud.
A famous front cover of The Economist in 2017 declared that the 'world’s most valuable resource is no longer oil, but data.' The value of data has indeed increased significantly. Organizations rely on data and data analytics for almost every facet of their operations and use it to make insightful decisions to help move the business forward.
Many have invested in the tools and solutions - AI, CRM,...
Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have...
Since keeping the bad at bay is the rallying cry of the day, enterprises need comprehensive protection that spans the entire lifecycle of threats from the staging of email-borne threats outside your organization to active threats landing in the inbox. Fortra’s Advanced Email Security solutions do just this—whether you are operating in the cloud, in a hybrid environment, or on-prem through a complete solution, we can help you solve your toughest email security challenges.
What is steganography? And how are criminal groups using it to exfiltrate data? Alyn Hockey, VP Product Management, explains all in this Digital Journal article and describes what measures companies can take to plug this vulnerability.
Watch this recording from our accounts payable (AP) automation expert Greg Schmidt to discover the simplicity that Webdocs can bring to your AP department.
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
QZDASOINIT job issues can cause high CPU usage and hurt IBM i (iSeries, AS/400) performance. Learn how using Robot Monitor can help you proactively avoid resource issues.
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance. That...
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.