SIM Swapping Attacks: A Surprisingly Common Cyberthreat

Sim swap fraud

Author: Robert James Collie, Intelligence Analyst SIM swapping attacks quintupled from 2021 to 2022. Potential consequences of this cyberattack include monetary theft and reputational harm.  Anyone may be targeted by a SIM swapping attack and the impacts can extend far beyond the individual who is targeted to include professional or personal networks. In this post, […]

Hamas’ Use of Social Media & How to Protect Your Family

family security - protecting children from social media

Author: Kelly Shemansky, Red Five Security The recent use of social media by Hamas presents an increased risk of exposure to harmful content to social media users, including families. This week, as everyone’s social media feeds are flooded with content covering the Israel-Hamas war, it is important to remember that the “barrier for entry” to […]

Best Practices for Internal Threat Teams During a Crisis

Crisis management

Author: Karna McGarry, Vice President of  Managed Services, Red Five Security The recent violence in Israel is a stark reminder of how quickly the security environment can change—often without warning—and raises the risk for a company’s safety of personnel, facilities, and operations. The war in Ukraine continues and other threats loom, which can overwhelm your threat […]

Smart Home Devices: Concerns, Vulnerabilities, and How to Address Them

smart home device cyber security

Author:  Garrett Bell (Analyst, Security Consulting) The idea of a “smart home,” a home filled with connected devices that conveniently streamline entertainment, security, lighting, and other functions, has grown in popularity in recent years evidenced by the growing number of connected devices in American households. US households have approximately 22 connected devices on average, according […]

5 Benefits of a Corporate Travel Risk Program

Paris protests exemplify need for corporate travel security programs

Authored by: Nikki Desai (Associate Director, Security Consulting) An effective travel risk program is a key tool in any company’s risk management effort. Travel risk programs provide end-to-end service for traveling employees, starting from when the employee’s trip is planned up until the employee’s safe return home.  The process typically begins with a risk assessment […]

What Are Data Aggregators and How Do They Pose a Risk to Your Privacy and Security?

srub pii from the web

Authored by: Aaniyah Hicks, Red Five Investigative Intern What are Data Aggregators? Data aggregators, also known as people-finder sites, scour the internet looking for people’s personally identifiable information (PII) in order to compile easily accessible online profiles of the individual. Data aggregators pull your information from a variety of public sources, including public records such as […]

What’s The Big Deal About TikTok and What Can You Do to Protect Your Data

tiktok privacy

  TikTok is an extremely popular short-form video social media platform that has attracted more than 150 million active users in the US. It has garnered so much attention—and  ire—from  the federal government, state governments, international bodies, and private institutions due to its popularity, the dangers associated with the platform’s data collection, and the potential […]