On my first day on the job in the information security department, one of the first goals was to set the top 5 security threats. These five threats include: Phishing – 90% of cyberattacks begin with phishing. This includes the form of what seems like real-life legit emails that seduce users to reveal private and personal information. These forms are meant to seem harmless, although […]



