Skip to main navigation
Home
New WH menu
  • Marketplace
  • News & Insights
  • About Us
    • Company
    • Investor
    • Careers
  • Log In | Sign Up
  • Identify Your Risk
  1. Marketplace
  2. Featured
Featured
Cybersecurity is like Football and You Need a Playbook

Cybersecurity is like Football and You Need a Playbook

by Katherine Bodendorfer
WhiteHawk CEC, Inc.
02/14/2019

Millions of Americans recently hosted friends, made big pots of chili, and gathered around television sets to watch Super Bowl LIII. While there was a lot of prep on the viewers’ side, imagine the prep hours spent by the athletes playing in the game. Their dedication to drills, film study, and situation preparedness. Their preparation for relentless assaults, powerful counterattacks, and trick plays. Cybersecurity is a lot like football.

Utilities at Risk: Solutions at Hand

Utilities at Risk: Solutions at Hand

by Terry Roberts
WhiteHawk CEC, Inc.
02/11/2019

The global energy grid is an optimal first strike for any malicious military or economic campaign. And it doesn’t take an “army” to make it happen. Even worse, because of the breadth (over 3,200 energy utilities companies in America) and the varying cyber maturity of smaller utilities, sophisticated hackers have already mapped our Energy Grid.

6 Types of Email Cyber Crime Methods (Phishing) to Watch Out For in 2019

6 Types of Email Cyber Crime Methods (Phishing) to Watch Out For in 2019

by Katherine Bodendorfer
WhiteHawk CEC, Inc.
02/11/2019

Because Phishing Email attacks are always evolving, below are 6 types of phishing attacks to watch out for in 2019.

1) Vishing (voice + phishing = vishing): Vishing is an attempt to obtain private and sensitive information over the phone. Scammers use robots or real people to call and convince victims to share their information. Majority of reputable government entities, organizations or companies will not ask for personal information over the phone. 

3 Ways Email Phishing Attacks Have Evolved

3 Ways Email Phishing Attacks Have Evolved

by Katherine Bodendorfer
WhiteHawk CEC, Inc.
02/05/2019

Phishing is an attempt to obtain sensitive, and confidential information by tricking the email recipient into believing the source of the email is reputable and the action they want you to take (like clicking on a link) is logical.

5 Tips to Know Before Filing Your Taxes

5 Tips to Know Before Filing Your Taxes

by Mike Ferris
WhiteHawk CEC, Inc.
01/30/2019

Tax fraud takes many forms, such as W2 phishing hacks, identity theft through access to your social security number, or other information breaches. Last year, we blogged about the 3 tips to know before filing taxes. With the tax season well underway, let’s revisit the tips and explore additional guidelines.

Here are 5 tips to make sure that you are taking proper precautions:

1. File your taxes as soon as possible. 

Utility Sector: 4 Essential Cyber Risk Measures

Utility Sector: 4 Essential Cyber Risk Measures

by Katherine Bodendorfer
WhiteHawk CEC, Inc.
01/10/2019

High end State and criminal hackers are targeting the utility sector on a daily basis.  Despite the sector’s recognition of their cyber threat landscape, trends and best practices, many small and mid-sized utilities do not have the resident expertise to effectively identify, prioritize and mitigate key cyber risks.

Below is a 4 Point Plan to addressing key utility sector cybersecurity risks in real time:

1) Optimize an annual cybersecurity audit or baseline by:

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Next page ››
  • Last page »
Protect Your Business
  • Marketplace
  • Identify Your Risk
  • News & Insights
About Us
  • Company
  • Investor
Third Footer Column
  • Careers
  • Contact Us
© Copyright WhiteHawk
Privacy Notice Terms and Conditions