Jan 23, 20202 minPhishing attacks are becoming more personalCheck out this highly personalized and targeted phishing attempt one of our Bedrock employees received recently!
Aug 22, 20194 min6 Non-Email Phishing Attacks Everyone Should Identify Now77 percent of phishing attacks are launched via file-less techniques that go undetected by standard endpoint security solutions. In other wo
Jul 30, 201910 min7 mobile security threats you should take seriously in 2019Mobile security is at the top of every company's worry list these days — and for good reason: Nearly all workers now routinely access co
Jul 15, 20198 min4 tips for building a strong security cultureSecurity teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach
Apr 12, 20192 minHow to Identify Email SpoofingEmail spoofing is when an email is forged by an attacker to make it appear that it's coming from someone else, usually someone you know,
Dec 28, 20182 min5 Cybersecurity Habits Law Firms Should Kick in 2019With 2019 just a few days away, lawyers and their firms should make a few cybersecurity-specific New Year’s resolutions.
Dec 20, 20187 min13 data breach predictions for 2019Data breaches are inevitable. Here are some predictions from industry experts about where, how and why cyber criminals will attempt to break
Oct 12, 20182 minNational Cybersecurity Awareness Month 2018Americans are spending more time online than ever before. As more people use the Internet for online shopping, banking, financial management
Mar 6, 20182 minNational Consumer Protection WeekBedrock Technology has information for you during National Consumer Protection Week — March 4-10, 2018 — and any time of the year.
Dec 7, 20172 minBest Practices: Social Media AccountsCyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cybe
Oct 4, 20172 minCybersecurity Best Practice Series: Website NavigationWe finish off our cybersecurity mini series with a round up of tips on how to surf the net safe and secure.
Sep 28, 20173 minCybersecurity Best Practice Series: Phone ScamsIn this post we identify and discuss various phone call and texting scams for our ongoing cybersecurity best practices mini series.
Sep 22, 20173 minCybersecurity Best Practice Series: Phishing and Email ScamsThe next topic in our best practices series will focus on email scams/phishing.