Forget Your Username?

Fill in the field below to retrieve your username.

Back to Log In

Product

Articles

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

From Policy To Practice: Making Anti?Retaliation Protections For Healthcare Staff Stick

A clinic settles a claim of retaliation with the EEOC. We comment on concrete steps organizations can take to translate written anti?retaliation policies into daily supervisory decisions that protect witnesses and preserve trust.

From Confidential To Compromised: Closing Trade Secret Vulnerabilities?

A chef is arrested for stealing secret recipes. We comment on how clear definitions, monitoring, and swift enforcement transform trade secrets from informal know-how into protected assets.

When Managers Are Happy, Are Your Employees Happy? You Make The Call

A survey reveals that when managers are happy, employees are happy. What do you think? You make the call and join the conversation.

Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.