The 10 best phishing email templates to send to employees – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau Contributed by George Mack, Content Marketing Manager, Check Point Software. Are your employees properly trained to spot the red flags in a phishing email? If not, you could be putting your organization at grave risk –...

6 steps to stop ransomware from taking you hostage – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Ransomware is a growing threat, especially for US-based organizations. Cyber criminals increasingly focus on “triple extortion” ransomware attacks, which target individuals’ data. Six simple actions can...

International Criminal Court attacked by cyber criminals – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: One of the world’s most high-profile and highly regarded institutions, the International Criminal Court (ICC), has reported that its computer systems have been hacked. The ICC said that it detected unusual...

Mystery hacking group targets space telescopes – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Two major astronomy observatories – the Gemini North Telescope in Hawaii and the Gemini South Telescope in Chile – were forced to halt operations on account of a cyber attack. The incident also disrupted...

Catch rates: 5% can cost you $1.3M in risk per week – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau Keely Wilkins is an Evangelist with the Office of the CTO as well as a Pre-Sales Security Engineer at Check Point. She has been in the technology and security industry for over 25 years. On behalf of Check Point, Keely...