Have Questions? Call or Text Your Cybersecurity Experts 7 Days a Week! (307) 999-7755

ChartFortress Blog welcome on board!

2019 Data Breaches - Short List

2019 Data Breaches - Short List

Data breach Attack short list for 2019. Note that this data is from reported data only. There are many more attacks for July 2019. But this gives you insight into the number of companies that are vulnerable. *Yes we all are vulnerable. Hackers have no preference and are equal opportunity attackers.*

Read More →
Cybersecurity Crash Course Day 2/7 Human Behavior Manipulation

Cybersecurity Crash Course Day 2/7 Human Behavior Manipulation

Welcome to Day 2 of the ChatFortress Cybersecurity crash course

Read More →
8 types of hacking and social engineering attack campaigns

8 types of hacking and social engineering attack campaigns

Here are the 8 common types of email phishing attacks that hackers use to steal your identity.

Read More →
The Seven Essentials of a Modern Email Security Platform

The Seven Essentials of a Modern Email Security Platform

How businesses can reduce the time from phishing attack detection to response from hours and days to just seconds. Did you know that any organization, regardless of size and the number of in-house security personnel employed, can now automatically prevent, detect and respond to all types of sophisticated phishing techniques in real-time. Now imagine how much time, money and resources it could save your company and how much burden might be alleviated from your Security and IT teams?

Read More →
Six common misconceptions about cybersecurity

Six common misconceptions about cybersecurity

Which of these six common misconceptions are increasing your risk and liability when it comes to cybersecurity.

Read More →
Ransomware Attack short list for July 2019

Ransomware Attack short list for July 2019

Ransomware Attack short list for July 2019. Note that this data is from reported data only. There are many more attacks for July 2019. But this gives you insight into the number of companies that are vulnerable. *Yes we all are vulnerable. Hackers have no preference and are equal opportunity attackers.*

Read More →
How does email phishing work?

How does email phishing work?

Discover how email phishing works and how hackers use email to steal your data and money.

Read More →
Cybersecurity Crash Course Day 1 Passwords

Cybersecurity Crash Course Day 1 Passwords

Welcome to Day 1 of the ChatFortress Cybersecurity crash course

Read More →
Ransomware… it’s only something on the news right?

Ransomware… it’s only something on the news right?

Ransomware is a trending for of malware that locks users out of their file or device. The Ransomware then demands payment in-exchange for releasing the device. Sometimes threats are made along the lines of either deleting the data or exposing it publicly. Ransomware is a trending for of malware that locks users out of their file or device. The Ransomware then demands payment in-exchange for releasing the device. Sometimes threats are made along the lines of either deleting the data or exposing it publicly.

Read More →
How a phishing attack almost took down a power company

How a phishing attack almost took down a power company

The increase in cyberattacks targeting critical infrastructure is gaining the world’s attention. While many organizations are hesitant to report any attempted or successful breach, the Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT) in the United States reported a 20% uptick in attacks between 2015 and 2016.

Read More →
ELIMINATING TARGETED PHISHING EMAIL ATTACK ON FINANCIAL SERVICES COMPANY THROUGH AUTOMATION AND AWARENESS

ELIMINATING TARGETED PHISHING EMAIL ATTACK ON FINANCIAL SERVICES COMPANY THROUGH AUTOMATION AND AWARENESS

Cybersecurity is an important element in every employees daily tasks. If an employee, contractor or vendor has access to your email. You should be implementing an email phishing and training awareness program. The financial services industry is a prime target for cybercrime, with hackers targeting financial services firms 300 percent more than any other sector. A common and, frankly, simple method cyber criminals use to access an enterprise’s confidential and personal information is through phishing attacks. In fact, phishing attacks surged by 250 percent in the first quarter of 2016 - the highest ever since 2004, according to the Anti-Phishing Working Group (APWG).

Read More →
Anti-Phishing Requires A Three-Pronged Strategy: Technical Controls, End-user Controls and Process Automation

Anti-Phishing Requires A Three-Pronged Strategy: Technical Controls, End-user Controls and Process Automation

Email phishing remains the most commonly exploited attack vector despite many organizations making significant financial investments in phishing awareness training, DMARC and gateway-level email security tools. According to research from CyberDB, 156 million phishing emails are sent out every day and email users receive up to 20 phishing emails each month. This whitepaper explores how modern phishing techniques, such as business email compromise (BEC), ransomware, spear-phishing and advanced persistent threats (APTs) are meticulously designed to defeat traditional email security approaches and how The ChatFortress Email Guardian and Ironscales’ advanced threat protection platform is uniquely built to addresses the contemporary techniques of phishers.

Read More →
How much does a data breach cost?

How much does a data breach cost?

Do you know the true cost of a data breach or a hack? That's right if your data is compromised what will it cost you?

Read More →
Domino Effect of Data Breaches

Domino Effect of Data Breaches

The domino effect of a Data breach can be up to 13 times greater than the cost of the single-party incident. The fallout of loss that a company incurs is transferred onto their vendors, contractors, employees like a domino chain impacting everyone.

Read More →
City of Ellensburg loses $185K to Cyber Scammers disguised as vendor

City of Ellensburg loses $185K to Cyber Scammers disguised as vendor

City of Ellensburg loses $185K to Cyber Scammers disguised as vendor

Read More →
ChatFortress Secure Chat Frequently Asked Questions

ChatFortress Secure Chat Frequently Asked Questions

Here are some of the common questions we get about the ChatFotress Secure Chat product.

Read More →
Title Companies Compromised on Dark Web

Title Companies Compromised on Dark Web

Title Companies Compromised on Dark Web. ChatFortress completed a test of 141 title companies to see how many companies had compromised username and password information on the dark web. The results were scary!

Read More →
Brokers beware is your Docusign email legit?

Brokers beware is your Docusign email legit?

Listen to this Real Estate Broker share how they almost lost their funds due to an email phishing scam using Docusign

Read More →
What to do about wire transfer fraud

What to do about wire transfer fraud

Here are the 3 steps you need to take if you have been a victim of wire transfer fraud! Act fast because the sooner you can take action the more likely you will be to recover your funds.

Read More →
Aaron Cole Story

Aaron Cole Story

Listen to Aaron explain how wire fraud couldn't happen to him.

Read More →
Title Company Scam $400,000 Deposit from Closing Scam

Title Company Scam $400,000 Deposit from Closing Scam

Hackers dupe woman into wiring them $400,000 after faking emails from title company

Read More →
State Supreme Court judge loses over $1M in real estate email scam

State Supreme Court judge loses over $1M in real estate email scam

A state Supreme Court judge was scammed out of more than $1 million after being fooled by an email she thought had been sent by her real estate lawyer, the Daily News has learned. Acting State Supreme Court Justice Lori Sattler, 51, was duped while trying to sell her apartment and buy another, sources said.

Read More →
Home buyer closing scam costs Alabama family $250K

Home buyer closing scam costs Alabama family $250K

It's known as the Closing Cost Scam. Home buyers are tricked into sending thousands of dollars to cyberthieves who intercept emails. These scams are up 11 000 percent from 2015 to 2017 in the real estate sector. May of 2018 saw the highest number of victims. Nationwide losses reported at $1.1 billion. Like everywhere else Alabama is getting hit according to the FBI One home buyer lost $250 000. Another case was reported just last week.

Read More →
Orlando homebuyers lose $46,000 in title company impostor scheme! Lawsuit blames realtor's lax security protocol

Orlando homebuyers lose $46,000 in title company impostor scheme! Lawsuit blames realtor's lax security protocol

This hack was made possible due to a Real Estate Agent failing to secure their systems. The matter has escalated to a court case resulting in the Real Estate Agent being sued for breaching their own policy. Even though there was a disclaimer yet the Agents actions have created a liability.

Read More →
ChatFortress Partners with Ironscales to eliminate Email Phishing attacks at your Email Inbox

ChatFortress Partners with Ironscales to eliminate Email Phishing attacks at your Email Inbox

ChatFortress Partners with Ironscales to eliminate Email Phishing attacks at your Email Inbox. Email phishing attacks is a major problem for business owners and consumers.

Read More →
Email Header extraction

Email Header extraction

Discover how to extract the data from your email headers to identify who is sending you email.

Read More →
Hackers are now using VOICE calls to swipe your funds!

Hackers are now using VOICE calls to swipe your funds!

Listen to this Real Estate Broker share how they almost lost their funds due to an email phishing scam using Docusign

Read More →
Title Agents losing funds in Payoff Fraud

Title Agents losing funds in Payoff Fraud

Hackers have truly unlocked a cold rush of money as they continue to steal unsuspecting buyers and sellers funds in the property buy and sell transaction. However Title Companies have become an increasing target from hackers because of bigger payouts.

Read More →