business

Insider Threats: Unintentional

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within. In this week’s micro training we’ll look at Unintentional Insider Threats, which are actions that may harm an organization that are NOT planned …

Insider Threats: Unintentional Read More »

SLAM Method: “M” is for Message

The SLAM Method is a phish-catching mnemonic device that helps you break apart and analyze the validity of every email that slides into your inbox.     In this week’s Micro Training, we’re reviewing the letter “M,” which stands for message. As the final letter in the SLAM Method, messages are a scammer’s greatest asset when …

SLAM Method: “M” is for Message Read More »

SLAM Method: “A” is for Attachments

The SLAM Method is a phish-catching mnemonic device that helps you break apart and analyze the validity of every email that slides into your inbox.    In this week’s Micro Training, we’re reviewing the letter “A,” which stands for attachments. Similar to links, attachments are a convincing phishing device that, when clicked on, can lead …

SLAM Method: “A” is for Attachments Read More »