Phishing attacks remain a threat to enterprise systems and data, and the method of entry is no longer limited to email. Your employees may not be trained to recognize some of the newer attempts to gain access to your technology. The typical phishing attempt is still carried out through a legitimate-looking email message. The telltale sign is the sense of urgency to take action so as to gain or avoid something. The specific format of phishing attacks continues to evolve, with some looking like … [Read more...]