jolera-logo-24-white

The Formjacking Threat Explained

Last year, several retailers fell victim to a cyber attack that exposed the payment information of several of their customers. One well known example is the British Airways breach that affected more than 380,000 passengers. All of these retailers were targets of an...

How to Create an Incident Response Plan

The threat of a cyber attack is constantly present and 80% of IT business leaders expect to face a critical breach this year. Companies who experience a data breach can expect loss of revenue due to downtime, reputation and recovery. One of the ways a company can...

5 Tips to Secure Business Communications

If your email was hacked today what information would be at risk? Intellectual property? Names of investors? Customer data? Email hacking is not new; there have been several companies who have made headlines in the past who have been involved in email hacks, such...

Dangers of Typosquatting and How to Protect Yourself

When people are writing documents or sending out important emails, they tend to look at what they’re typing more closely. But when it comes to typing in a website, people can absentmindedly mistype a URL or make a typo while they’re in a rush. It may not seem like a...

5 Security Technologies Used to Fight Cyber Attacks

Businesses are increasingly being targeted by hackers. In 2018, enterprise malware detection rose 79%, with trojans being the biggest malware threat. As technology continues to advance, the threats targeting organizations are expected to get more aggressive,...