Armand here again reporting for Tech Essentials. This week, I’m writing to you from…my mom’s basement. This is so that I can try and get in the mindset of a cybercriminal trying to leverage AI to perpetrate a sophisticated email scam.
Got a billion-dollar IT budget? Got the best Microsoft cybersecurity tools money can buy? Got teams and teams of IT staff who proactively monitor lights blinking on servers and charts on screens looking for cybercriminal activity within your network?
[If you are a routine kind of person, stop reading here. If you consider yourself to be less bland, I challenge you to read to the end.]
We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).
You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.
You may be barricaded inside the best of (fire)walls, but you could still be exposed by your recipients’ nostalgia for their memorable passwords. Joseph Heller, author of Catch 22, famously wrote that “just because you’re paranoid doesn’t mean they aren’t after you.” Many Generation Xers out there may recall that Kurt Cobain also used this […]
What were the top tech and e-security trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]
Only RMail offers features that can foil BEC attacks without “cry wolf” email stamps. We’ve talked a lot about the hydra of BEC (business email compromise) attacks recently due to the increasing share of these types of attacks within the universe of cybercrime that employ multiple techniques to lure users into sending money to the […]
Business Email Compromise Cybercriminal Lures Attack in Many Ways, Like a Hydra Monster with Many Heads. Each Attack Vector Needs a Defense. Enter RMail. Before we start today’s article, we’d like to ensure you have heard about – and been invited to – RPost’s Optimize!2022 global e-security and eSign user conference (click here to read […]
We’ll Make Etymology of Acronym-Originated Tech Speak Interesting… and Useful. Yes, it’s still the year of the tiger – a year of supposed unbound prosperity. But with the stock market plunging, and cybercrime flourishing, I thought it might be nice to forget about tigers and put on another hat, one of an etymologist.
April 26, 2024
April 19, 2024
April 12, 2024
April 05, 2024
March 29, 2024