Media Center

How Employees Can Be The Biggest Target for W-2 Phishing During Tax Season

Lacy Rex

In the midst of tax season, organizations are moving at a rapid pace to meet deadlines and internal demands. Criminals know this hectic time is opportune for scams and fraud. Between January and April 15th, the IRS reports the number of scams has jumped significantly in the last few years.…

Read More

Ohio Passes “Data Protection Act” to Encourage Businesses to Proactively Use Higher Cybersecurity Frameworks

Lacy Rex

On Aug. 3, 2018, Ohio passed Senate Bill No. 220, the “Data Protection Act.” The Bill went into effect on Nov. 2, 2018. While many states have implemented punitive laws, Ohio’s new Act is designed to incentivize Ohio businesses to voluntarily implement and maintain a cybersecurity infrastructure. By utilizing one…

Read More

Cyber Risk Concern Grows Among Manufacturers

oswaldcompanies

The evolution of manufacturing processes has increased efficiencies and improved quality output. At the same time, advancing technologies opens the door for growing cyber risk for manufacturers. The result can be catastrophic, impacting operations, revenue and reputation. Good Reason to Worry The growing sense of concern about cyber security in…

Read More

Social Engineering Fraud: Evaluating for Gaps and Overlaps

Lacy Rex

Cyber crime is a booming business for criminals. Businesses of all sizes are being targeted for scams that range from tech support scams to phishing attacks and telecommunications fraud. With the ability to outsource services via ‘Crime as a Service’ (CaaS), it lowers the bar for entry into cyber crime.…

Read More

Cyber Liability: The Download on Ransomware and Social Engineering

Lacy Rex

Nearly every organization has an exposure to Cyber Liability. The only differentiating factors are severity and where an organization falls from a risk profile. Organizations that have a large amount of personal health information, financial information and credit card information can be easily identified as targets for cyber-attacks. These attacks…

Read More