• Posted in:

    What do Phishing Attacks Really Look Like?

    Hackers using phishing attacks as a security breach method are often sending email messages to users giving the impression they’re representing a company you’re conducting business with, such as a financial or banking institution, or a web service you’re using. Common Phishing Attack Tactics Although the general perception is phishing attacks look fake and everyone […]

    Read more

  • Posted in:

    Dropbox’s biggest data breaches and hacks

    Although  a great number of businesses uses Dropbox as their primary file hosting service, few people know how secure their corporate files are. Dropbox is not as insecure as some skeptics would suggest, but recent headlines about data breaches make us question its reliability for business usage. Why Dropbox Breaches Happen?         Anyone can access Dropbox shares […]

    Read more

  • Posted in:

    Top Cyber Security Risks Affecting M&A Deals

    Businesses of all kinds are vulnerable to cyber attacks. Lloyd’s estimated that businesses lose up to $400 billion per year due to data breaches. With the recent growth in mergers and acquisitions activity — 2015 was the biggest year for M&A ever, according to the Wall Street Journal — deal activity is drawing the attention of cyber criminals. Although there was always the risk of deal information leaking, now that documents are shared electronically, the possibility of unauthorized access to documents is greatly increased.

    Read more

  • Posted in:

    Tops Apps for M&A in 2016

    Deals can get stalled for virtually endless reasons. That’s why it’s important to minimize any potential problems on your end by staying organized, informed, and communicative throughout the whole process. That can be hard, but fortunately there is a growing number of apps geared toward M&A professionals to make their lives easier and their work more effective. Here are five to check out in 2016.

    Read more