TraceSecurity Blog
The latest cybersecurity news, recommendations, and best practices - all in one place
-
Articles
How Do Bad Actors Use Impersonations
Impersonations are a big part of phishing. After gathering information, bad actors will try to appear as someone they're not.
Read moreJuly 14, 2025
-
Articles
Deepfakes and Cybersecurity: The New Threat to MFA
Deepfakes are realistic synthetic media created using artificial intelligence. There are ways to identify them, however.
Read moreJuly 07, 2025
-
Articles
The Risk of Externally Accessible Printers
External networks are the public-facing perimeter of any organization’s virtual presence. A printer can be a vulnerability if not protected.
Read moreJune 30, 2025
-
Articles
Digital Deception: The Rise of Deepfakes and How to Spot Them
Deepfakes are becoming a common tactic used by bad actors. Fortunately, there are many ways to recognize and defend against deepfakes.
Read moreJune 23, 2025
-
Articles
Digital Exhaust and Behavioral Fingerprinting
Digital exhaust and behavioral fingerprinting are utilized in cybersecurity, surveillance, and marketing. Be aware of your metadata.
Read moreJune 16, 2025
-
Articles
What is a USB Drop?
While not a common form of social engineering, USB drops can still cause a lot of problems. Never use a USB drive off the ground.
Read moreJune 09, 2025
-
Articles
Removable Storage Restrictions for Financial Institutions
Removable Storage Restrictions are important for financial institutions. These policies are often overlooked when it comes to protection and cybersecurity.
Read moreJune 02, 2025
-
Articles
What is an Acceptable Use Policy (AUP)?
All organizations should implement an Acceptable Use Policy and require their employees to sign it. They can help protect against malicious websites.
Read moreMay 27, 2025
-
Articles
What is Smishing?
Text messages have become a common form of social engineering. Be sure to keep an eye out for unknown numbers.
Read moreMay 19, 2025
-
Articles
FatalRAT Malware Targeting Organizations
FatalRAT malware targeting organizations in the Asia-Pacific region
Read moreMay 15, 2025