by Chandler Millstone | Sep 13, 2023 | Blog
MGM Resorts Suffers Vishing Cyberattack Reporting suggests massive cyber breach began with a phone call to the Help Desk This blog provides a recap as of Wednesday, September 13, 2023, of the unfolding news surrounding the MGM Resorts cybersecurity event. Highlights A...
by Chandler Millstone | Nov 21, 2022 | Articles, Blog
A Vishing Attack is Coming Your Way Who would have guessed that, in 2022, the humble phone would emerge as the weapon of choice for sophisticated cybercriminals intent on infiltrating your organization, threatening your employees, disrupting your systems and stealing...
by Chandler Millstone | Feb 15, 2022 | Articles, Blog
How Cyber Thieves Thrive in the Cover of Chaos SERIES (PART 3): Understanding and Applying the FAIR™ model as an Enterprise Cyber Risk Management Strategy EXECUTIVE SUMMARY In this series, Understanding and Applying the FAIR™ model as an Enterprise Cyber Risk...
by Chandler Millstone | Jan 27, 2022 | Articles, Blog
Nuisance Phone Calls – How Bad Can They Be? SERIES (PART 2): Understanding and Applying the FAIR™ model as an Enterprise Cyber Risk Management Strategy EXECUTIVE SUMMARY At the start of this series, Understanding and Applying the FAIR™ model as an Enterprise Cyber...
by Chandler Millstone | Jan 6, 2022 | Articles, Blog
Risk, Skydiving, Data & Secure Phone Calls SERIES (PART 1): Understanding and Applying the FAIR™ model as an Enterprise Cyber Risk Management Strategy EXECUTIVE SUMMARY This is the first in a series of posts that attempts to make sense of the multi-dimensional...
by Chandler Millstone | Aug 18, 2021 | Blog
Why Your Phone Company Doesn’t Block Unwanted Spam Calls to Your Enterprise By Richard Quattrocchi Voice spam can be defined as any unwanted, irrelevant, unsolicited, or inappropriate call or voicemail message. Voice spam and email spam share many similarities. Both...
Recent Comments