Fake invoices are the #1 disguise for distributing malware. Symantec 2018 ISTR Spam and phishing emails come packaged up in all sorts of disguises. According to Symantec’s 2018 Internet Security Threat Report, these are the most common when it comes to distributing malware. Most common disguises: Bill / invoice (15.9%) Email delivery failure (15.3%) Legal … Read more

Read More

Malicious content in spam emails is increasing in the form of attachments and URLs. Malicious attachments and URLs attempt to deliver software that can compromise the security of a computer. Inboxes are still constantly under attack – 92.4% of malware is delivered via email according to Verizon 2018 DBIR.

Read More

With Halloween approaching tomorrow, it is an excellent time to take a look at the “Tricks” being played at the doorstep of IT Departments. From more sophisticated cyber attacks to advances in job-killing technologies, 2018 has been a truly scary year for IT Departments. Cloud Computing The Cloud has made Enterprise Infrastructure more available for … Read more

Read More

Augmented intelligence is an alternative definition of artificial intelligence that focuses on AI’s helpful role, emphasizing that it is designed to “enhance human intelligence” rather than replace it. The word augmented, which means “to improve,” reinforces the role human intelligence plays when using machine learning and deep learning algorithms to discover relationships and solve problems. … Read more

Read More