Business Email Compromise (BEC) continues to be a top attack method cyber criminals use to steal millions from Colorado businesses. BEC is spear phishing targeting individuals that are involved with a company’s financial decisions with the intention of compromising that corporate officer’s email account. Read this document for more information on BEC.
Show All Answers
For decades, phishing has proven an effective method for attackers to dupe just about anyone into clicking on malicious links so they can wreak havoc on personal and professional lives. Alphabet made a quiz to help you detect phishing scams.
The National Counterintelligence and Security Center (NCSC) developed a campaign designed to help companies protect their assets from cyber attacks. NCSC is offering materials, including videos, brochures, and posters, to help organizations guard against supply chain threats, phishing threats, and economic/intellectual espionage.
The Small Business Association has this training on cyber security
This self-paced training exercise provides an introduction to securing information in a small business. Topics include: Defining cyber security; Explaining the importance of securing information through best cyber security practices; Identifying types of information that should be secured; Identifying the types of cyber threats; Defining risk management; and Listing best practices for guarding against cyber threats.
Sign up to receive OUCH! . OUCH! is the world's leading, free security awareness newsletter designed for everyone. Published every month in multiple languages, each edition is carefully researched and developed.
Training your employees is the number one way to protect your business from cyber attacks. Amazon makes available the cybersecurity awareness training the company uses with its employees to businesses and individuals around the world—at no cost.