
Phishing
How Secure Wire Transfer Procedures Can Prevent Business Email Compromise
Introduction Formerly known as the “man in the email attack,” business email compromise (BEC) is a scam that takes control of a senior employee’s email acco

Phishing
Phishing Attacks in the Manufacturing Industry
Introduction In the second quarter of 2017, the manufacturing industry was the most targeted by cyber-attacks, with 24% of attacks globally, according to NNT

Phishing
Phishing Attacks in the Not-For-Profit Industry
Introduction Although the non-profit sector is not in the top phished industries of 2017, it is not as safe as one may think. The statistics from Privacy Rig

Retired
Security+: Mitigating Security Risks in Static Environments (SY0-401) [DECOMMISSIONED ARTICLE]
NOTE: This article reflects an older version of the Security+ Exam – please see the current Security+ Certification page for the most up-to-date information.

(ISC)² CISSP
CISSP: Disaster recovery processes and plans
This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. Disaster recovery is the p

(ISC)² CISSP
Change management and the CISSP
This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. When a business begins to

Healthcare information security
Security Risk Assessment in Health Care
Introduction Security Risk Assessment in Care Settings are intended to protect and secure health information (electronic protected health information or ePHI