Inspired eLearning, Inc.

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 day ago

New blog articles detected

  • Security Tips for More Secure Trips

      Summertime is the right time for vacation. The kids are out of school, the beach weather is kicking into full gear, and let’s face it, you deserve a few days off! But before you hit the road or take to the air, there are a few things you need to remember about remaining cyber […] The post Security Tips for More Secure Trips appeared first on Inspired eLearning Compliance Training Blog.

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • RANSOMWARE ALERT: DON’T CLICK that Link!

    While most of the world was out celebrating Mother’s Day weekend, the cyber world was up in arms as a massive ransomware attack went viral. From Shadow Broker’s leaked NSA exploits, Wana Decrypt0r, aka “WannaCry”, was born. This ransomware attack starts from a phishing email with a malicious link to a malware payload. When clicked, […] The post RANSOMWARE ALERT: DON’T CLICK that Link! appeared fi...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Google Doc Drama

    Last Tuesday, it seemed like the entire Internet lit up over a Gmail/Google Docs phishing scam that was whirling around the webosphere. The attack, perpetrated by an unknown hacker, targeted about a million users (or as Google put it in their statement, “fewer than 0.1 percent of Gmail users”). By evening, every news network had […] The post Google Doc Drama appeared first on Inspired eLearning Co...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • Vigilante or Cyber SuperHero?

    By Mison Riggins At a local call center for office related IoT devices, customer service representatives are enjoying a quiet morning when all of a sudden all the incoming lines are ringing off the hook and support email requests are filling up inboxes with subject headings such as…        “Employees cannot enter their […] The post Vigilante or Cyber SuperHero? appeared first on Inspired eLearning...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 4 weeks ago

New blog articles detected

  • Zero Day Malware Detected in MS Office

    By Mison Riggins A Zero Day exploit was recently discovered by FireEye and McAfee concerning a malware distribution mechanism that takes advantage of a vulnerability in Microsoft’s Object Linking and Embedding (OLE) feature. More than a billion people use Microsoft Office every day to do everything from creating documents to sending and receiving emails. Often, […] The post Zero Day Malware Detect...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • ISPs Watching You Watching Me

    By Terire Fears I was recently looking online for a used car to cruise through downtown. After a couple of days of indecision, I decided against getting a car and just relying on my current rusty but trusty for another couple years. As a result of my search though, it seems that each time I […] The post ISPs Watching You Watching Me appeared first on Inspired eLearning Compliance Training Blog.

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • What’s a Hacked Email Account Worth?

    By Mison Riggins During the tumultuous run-up to last year’s presidential election, a seemingly never-ending stream of hacked DNC emails were made public by Wikileaks. What made this hack so valuable for the hackers was the actual content of the emails, which revealed confidential and damaging information of national—even international—interest. It’s easy to see why […] The post What’s a Hacked Em...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • BEC Attacks with Last-Minute Tax Scams: W-2s, Bigger, Quicker Refunds…

    By Mison Riggins With the April 18th deadline for filing taxes quickly approaching, we can expect a deluge of last- minute tax scams cluttering our inboxes with subject lines like “Download your W-2,” “Get a bigger tax refund,” “Get your refund fast.” Don’t fall prey to these Business Email Compromise (BEC) attacks. The IRS warns […] The post BEC Attacks with Last-Minute Tax Scams: W-2s, Bigger, Q...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • IoT- Take it or Leave it?

    By Mison Riggins KEY QUESTIONS TO ASK BEFORE ANY IOT PURCHASE Before any purchase, even if it is a seemingly unthreatening gadget, like a doll with wi-fi capabilities, ask yourselves these key questions: Does it connect to the Internet? If yes, continue to the next questions… Does it provide for authentication or allow password changes? […] The post IoT- Take it or Leave it? appeared first on Insp...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Defense-in-Depth

    by Mison Riggins With today’s ever permeating tech world, it’s hard to escape the ripple effects of cyber attacks. Perhaps you didn’t purchase a talking teddy bear, a smart phone, or a smart fridge. Nonetheless, your cable set-top box and router at home, your all-in-one printer/fax/scanner device at work, and your wireless access at the […] The post Defense-in-Depth appeared first on Inspired eLea...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Teddy Bear Turned SpyCam

    by Mison Riggins Another breach in internet connected toys has been announced. A seemingly cuddly teddy bear that allowed family members to connect to each other over long distances via wireless connection became a spycam for nefarious hackers instead. Cloudpets, which allow parents and their children to communicate through wirelessly recorded voice messages, can be […] The post Teddy Bear Turned ...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • FruitFly: Mac-Based Espionage Malware

    By Mison Riggins Tips to avoid malware infections Run automatic updates for all software, especially Operating System (OS) updates. Download protection software such as anti-malware and antivirus solutions to all your devices and PCs that can connect to the internet REGARDLESS of OS type. Be sure to scan your devices and PCs on a regular […] The post FruitFly: Mac-Based Espionage Malware appeared ...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Beware of the Big Phish

    By Mison Riggins   You’ve got mail… You open the email from your office cubicle. It looks legit. It reads official. Should you click that link or not? Do you fill the form out or not? Nefarious phishers gifted us this new year with a special type of email scam: An official looking PDF attachment […] The post Beware of the Big Phish appeared first on Inspired eLearning Compliance Training Blog.

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • To Encrypt or Not to Encrypt

    With social media abuzz about email hacks, stolen personal information, ransomed credit card information, and cracked passwords, we are often unaware of the high-level attacks that occur every day against senior management and executives. Take this hypothetical scenario for example: A stolen laptop with administrative rights to “secure internal servers” of a Fortune 500 company […] The post To Enc...

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 2 months ago

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • 2017: A Better Year for Cyber Security?

    By Tyler Cohen Wood   Undeniably 2016 was one of the roughest years yet for the cyber security industry. Ransomware took hold of the nation like a parasite, using its razor-sharp teeth to sink into the gut of industry and draining the life blood out of our every confidence. B.E.C and more tactical targeted social […] The post 2017: A Better Year for Cyber Security? appeared first on Inspired eLear...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • U.S. Law Firms vs. Foreign Hackers

    By Tyler Cohen Wood Law firms have traditionally been considered bastions of security. We look to them to assist us with sensitive personal and business matters that demand—and receive—the utmost discretion and privacy. However, a disturbing trend is emerging where US law firms—including some of the most powerful, prestigious, and most well-known—are becoming victims of […] The post U.S. Law Firms...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Walking Through the Cyber Wonderland Keep Your Family Cyber Safe with IoT Devices this Holiday Season

    By Tyler Cohen Wood   My favorite time of year is upon us—the holiday season! A time of giving, beautiful decorations, friends, and family, and lots of great food. Of course this also means that holiday season sales are upon us, and if you’re anything like me, you’ll be taking advantage of these deals to […] The post Walking Through the Cyber Wonderland Keep Your Family Cyber Safe with IoT Devices...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 6 months ago

New blog articles detected

  • How to Shop Safely this Holiday Season on Cyber Friday/Monday

    By Tyler Cohen Wood   The holiday season is upon us, and there are tons of great deals on Black Friday and Cyber Monday just around the corner (Nov 25th and 28th). However, with ongoing concern about cyberattacks, hacking, identity theft, and Internet fraud at continuing at a high pitch, it’s critical that consumers take […] The post How to Shop Safely this Holiday Season on Cyber Friday/Monday ap...

  • How to Shop Safely this Holiday Season on Cyber Friday/Monday

    By Tyler Cohen Wood   The holiday season is upon us, and there are tons of great deals on Black Friday and Cyber Monday just around the corner (Nov 25th and 28th). However, with ongoing concern about cyberattacks, hacking, identity theft, and Internet fraud at continuing at a high pitch, it’s critical that consumers take […] The post How to Shop Safely this Holiday Season on Cyber Friday/Monday ap...

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 6 months ago

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 6 months ago

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 6 months ago

Inspired eLearning, Inc.

Category: Conversion
Type: Landing Page

Generated 6 months ago

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 6 months ago

New blog articles detected

  • Plenty of Phishers in the Sea: The New Phishers and how not to take the Bait

    By Tyler Cohen Wood Have you ever had a friend reassure you that there were “plenty of fish in the sea?” Whether you wanted to hear it or not, it was a helpful reminder that we are all indeed surrounded by lots of other people. Well, in our digital age, we might say that there […] The post Plenty of Phishers in the Sea: The New Phishers and how not to take the Bait appeared first on Inspired eLear...

Inspired eLearning, Inc.

Category: Content
Type: Blog Article

Generated 7 months ago

New blog articles detected

  • Ransomware: What you Need to Know about the Newest Ransomware and Crucial Tips to Protect your Company

    By Tyler Cohen Wood The last quarter of 2015 and the first quarter of 2016 saw a 789 percent jump in phishing emails, most of which contained ransomware. Ransomware and other malware attacks are only growing in number and getting far more sophisticated. Ransomware is malware designed to lock all files on a device or […] The post Ransomware: What you Need to Know about the Newest Ransomware and Cru...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in