No More Signatures! Am I Still Safe?

If you have used a credit card in North America in the last month, you may have noticed that you were not asked for a signature. That may have come as a surprise. It turns out to be a good thing! In a March 2018 Infographic, Visa says that that the dollar amount of counterfeit […]
Read More ›

How Storytelling Helps Make a Personal Connection with an Audience

Connecting with an audience is a critical business skill. We all need it when we try to get a point across to someone else. We may be teaching a new idea or skill, explaining the importance of a new strategic initiative, or maybe trying to persuade a prospect to become a client. In my recent […]
Read More ›

How Password Spraying Could be an Attack Vector Into Your Organization

There are two common ways the bad guys might try to break into a building: spend lots of effort on one door or window, or try each door and window to see if one is easier to enter than the others. The same is true for attackers trying to compromise systems and networks (and penetration […]
Read More ›

What is a Stingray And How Does It Impact Me?

According to news reports from outlets including IDG’s CSO, the US Department of Homeland Security said in early April of this year that there are unauthorized “stingrays” in the Washington, DC areas and in “other cities.” To be perfectly honest, I cannot find the term stingray in the documents I read, and “StingRay” is a […]
Read More ›

Quad9 as a Tool to Fight Business Email Compromise

Business Email Compromise or BEC is not a new cybersecurity attack vector, but it is gaining more attention as it is becoming more common. The basic idea is that a scammer or con-artist uses deception to pretend to be a high-level official of an organization in order to compromise that organization or to otherwise profit. […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.