Skip to main content

Posts Tagged ‘phishing’

data privacy day perficient

Six Ways to Protect Yourself and Your Family on Data Privacy Day

This article was co-written by Iman Watson, senior solutions architect, and Kailey Hughes, lead development representative. As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place […]

Operation BLACKHAT

Operation BLACKHAT Two-Minute Conversation A tycoon businessman, Mr. Sanjay was having a two-minute conversation with the kidnappers regarding the ransom and location to rescue his son, a 5th-grade student – Raghav. Mr.Sanjay wondered how the kidnappers got the new family code. The family code changes every month and kept secret within the close aides. He […]

Phishing and Cybercrimes in Financial Services

My last blog discussed the benefits of data encryption and application programming. This blog dives into the cybercrimes of phishing and the signs it’s happening. Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing […]

Phishing Attacks – How Your Old Passwords Can Come Back To Bite You

As a security professional, I spend a considerable amount of time building awareness around good password hygiene, and I am starting to see forward progress in efforts like moving users away from short passwords to longer passphrases.  But even as we are moving towards better password selection, most people don’t know that their old passwords […]

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

How to Mitigate Security Risks with APIs

APIs in the Current World With the advancement of SOA and new-age technologies coming door-to-door, we see how the Internet of Things is touching our everyday lives, be it from Apple Watch and Fitbit to building apps in automobiles, banking, the retail industry, etc. I recently read somewhere that eCommerce for JC Penny is gaining […]

How to Avoid Damage From Phishing, Spear Phishing, and Whaling

“Phishing,” “spear phishing,” and “whaling” are not misspellings of aquatic sports. These words describe costly, illegal activities that use human engineering to steal, ransom and blackmail for profit, and Perficient’s information technology experts urge everyone to be aware of the distinctions and the dangers. Phishing is a fraudulent attempt, primarily made through email, to steal […]

Office 365 – Providing Your Users Visual Cues About Email Safety

It seems like every week I see a new phishing story coming through my social media feeds. The stories are all basically the same, someone with access to financials in an organization receives an email from “an executive” and follows instructions to wire thousands, hundreds of thousands or millions of dollars overseas. While I’m admittedly […]

4 Security Takeaways From The FBI

As IT consultants, we’re pretty sure that we’re smart enough to recognize phishing attacks against us. We all get emails asking us to open invoices, confirm our bank account information, or perform other actions designed to separate us from our credentials and our money. But according to a consultant specializing in penetration testing, 40% of us will still […]

My Top 7 Google Security Tips for Users and Admins

I.  Create Safe and Secure Passwords – By far the easiest way to access your mail account for nefarious activity is by using a stolen password. Google Apps User Make sure you create safe and unique passwords for all your important accounts Make sure you store your passwords in a secure way Try using a password generator […]