Call now for cybersecurity help: 888-646-1616

Tag: Phishing

HR Phishing Email Examples & How to Safely Defend Them

In Q2 2023, KnowBe4's report shows a scary statistic.   A worrying 50% of phishing attacks are HR-related. Do you know why?  Because they work. Cybercriminals are smart. They try to trick your emotions, causing fear, confusion, panic, and sometimes even excitement. This draws unsuspecting employees and business owners into their malicious traps. Even scarier, one […]
Read more

SMS Phishing / Smishing Examples and Tips

Smishing, also called SMS phishing or text message phishing, is a growing problem for many individuals and businesses. Smishing is a phishing message that uses your cell phone as the attack platform. Cyberattackers use smishing to do the following: Like phishing emails, smishing messages are not always obvious, and can sometimes be harder to detect. […]
Read more

[Infographic] Some types of multi-factor authentication can be phished!

It's true -- hackers can get around some types of multi-factor authentication (MFA). And this is scary! MFA has long been touted as the best way to protect your accounts. And this is still true. But. MFA is not bulletproof, and certain types of multi-factor authentication are more vulnerable than others. The type of MFA […]
Read more

Recognize, Prevent, and Report Phishing

Phishing scams can cripple an organization – so it’s important to know how to recognize, prevent, respond, and report phishing. You may think phishing scams are obvious, but this is simply not the case. Phishing scams can be incredibly convincing. This article will dive into some typical phishing red flags, our best phishing prevention tips, […]
Read more

What is Typosquatting?

Typosquatting is a method hackers use to trick you. Attackers can use typosquatting to trick you into visiting a website (so they earn ad revenue at best or steal your data at worst), install malware onto your computer, or combine it with a phishing email. Typosquatting is part of a bigger cybercrime category called cybersquatting. […]
Read more

What is Spear Phishing: Definition and 6 Helpful Tips

What is Spear Phishing? Here's an example: Imagine you get an email from a friend or family member asking for you to send the password for one of your accounts. The email looks too close to their actual email address for you to see a difference. The person sending the email uses a lot of […]
Read more

Do you know the most important phishing tip? 20 people didn't.

The best phishing tip? It's simple and it works! Last week, we were sitting in a conference room with 20 people. These were smart people. All highly educated. They all use computers every single day. We were talking to them about ways to keep safe online. The conversation ranged from phishing to ransomware to staying […]
Read more

The Best Ways to Fight Banking Trojans

Banking Trojans are back, and they're nasty. Click on the wrong email, and hackers drain your firm's operating accounts. Incredibly, many of these attacks even defeat your bank's two-factor authentication. Here's a great article that explains how banking trojans bypass two-factor authentication. So what should every business do to protect yourself against banking trojans? The […]
Read more

SEC Cybersecurity Guidance: Phishing

As our work moves online and becomes more digital, our risks are changing. In recognition of this fact, registered investment advisors must take cybersecurity seriously. The SEC cybersecurity guidance lays out clear directions for taking cybersecurity risks seriously. And one of the biggest threats to your firm today is phishing. The SEC Cybersecurity Guidance seems […]
Read more

Do you think we might be a good match?

Copyright 2025 Adelia Associates, LLC | All Rights Reserved