• Home
  • Products & Services
    • Managed Security Operations Center (SOC)
      • Security Operations Center
      • Security Information and Event Management (SIEM)
      • Threat Detection and Response
    • Employee Security Awareness Training
      • Security Awareness Training Pricing
      • Security Awareness Training Live Demo
    • HIPAA Secure Compliance and Cyber Security Training Platform
    • Advanced Email Protector
      • Advanced Email Protector Pricing
      • Advanced Email Protector Live Demo
    • Endpoint Essentials
      • EndPoint Essentials Pricing
      • Endpoint Essentials Live Demo
  • Partner
  • Blog
  • FAQs
  • Company
    • About Us
    • Legal
    • Privacy
    • Sitemap
    • Contact Us
    • Texas State Cybersecurity Training
  • 678.364.2500
  • Request Demo
Scam of the Month – Business Email Compromise Scam Targets an Employee

Scam of the Month – Business Email Compromise Scam Targets an Employee

by Ira Feuerstein | Jan 6, 2021 | BEC (Business Email Compromise), Scam of the Month

Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you’ll be better prepared when the next scam hits your inbox. This month’s submission comes...
Risks of Stimulus Scams Increasing

Risks of Stimulus Scams Increasing

by Ira Feuerstein | Dec 21, 2020 | Cybersecurity Training, Scam of the Month

The election is over, and the new administration will soon begin releasing future plans, but there remain other uncertainties at this time. One of the factors is the continued risk of cybercrimes and hackers, which continue to have a strong position that gives them an...
Scam of the Month – Fraudulent Texts Indicating a Possible COVID-19 Exposure

Scam of the Month – Fraudulent Texts Indicating a Possible COVID-19 Exposure

by Ira Feuerstein | Dec 2, 2020 | Scam of the Month

Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you’ll be better prepared when the next scam comes your way. This month’s submission comes from...
Scam of the Month – QR Code Scanning Leads to Big Issues

Scam of the Month – QR Code Scanning Leads to Big Issues

by Ira Feuerstein | Nov 5, 2020 | Scam of the Month

Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you’ll be better prepared when the next scam hits. This month’s submission comes from...
Scam of the Month – USB drives and Potential Scams

Scam of the Month – USB drives and Potential Scams

by Ira Feuerstein | Oct 15, 2020 | Endpoint Protection, Scam of the Month

Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you’ll be better prepared when the next scam hits. To protect identities, the names have been changed...

Categories

  • anti virus
  • BEC (Business Email Compromise)
  • cryptojacking
  • Cybersecurity Training
  • Email Encryption
  • Endpoint Protection
  • Infographic
  • Insider Threats
  • Phishing
  • Ransomware
  • Scam of the Month
  • SIEM/SOC
  • State Certification Program

Recent Posts

  • A Comprehensive Guide to Security Information and Event Management (SIEM)
  • Six Core Requirements for Securing Endpoints
  • How to Protect Your Precious Data from the Bad Guys
  • 5 Major Types of Endpoint Security for Enterprise Customers
  • 5 Major Threat Detection and Response Techniques

Archives

  • May 2022
  • April 2022
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020

Subscribe to Blog

Feed Icon

Get in touch

Phone

678.364.2500
Contact Us

email

[email protected]
  • Follow
  • Follow
  • Follow
  • Follow

About us

ThreatProtector’s mission is to protect our customers from ongoing cybersecurity threats. We provide the most effective cybersecurity awareness training, email encryption, and device endpoint protection for businesses of any size.

Navigation

Home
Products & Services
Partners
Resources
Company

Products

BreachSecure Platform
Advanced Email Protector
Endpoint Essentials

Join our email list

  • This field is for validation purposes and should be left unchanged.

© 2020 Threat Protector. All rights reserved

  • Legal
  • Privacy notice
  • Sitemap