From the Global Information Security Team


Mid April 2017

Fraudsters are getting more sophisticated about how they steal our money and personal information. They send us "phishing" emails that include personal information and make the emails look legitimate.
Then, too often, we click on a link in the email that requests personal information, or we download an attached file that damages our computer.
But we can outsmart fraudsters. Watch our video to learn more.
30% of phishing emails that contain information specific to the recipient get opened and 90% of the links in those emails get clicked. Wow!
Click on the image below to learn more about how phishing works and how to avoid it.
Behavior expert Sean Kaufman says there is a reason we tend to fall for phishing emails.
It's called "mental noise."
Recognizing mental noise can help you avoid getting ripped off. 
Click the button below to listen to Sean's explanation. 
(52 seconds)

Samsung’s new smartphone, the Galaxy S8, features several ways to lock the phone so others cannot access its data.


But tests show at this point, the phone’s option of scanning the owner’s face to get in is not reliable. Turns out, anyone can get into the phone by simply holding a picture of the owner up to the phone’s camera.


The Galaxy S8’s other security options, including using fingerprints, eye scans and traditional passwords, are much more secure.


Apple’s new iPhone, due this fall, reportedly will use new 3-D scanning technology that will allow owners to securely scan their faces. In any event, it is important to lock your phone’s home screen so no one except you can use it. 

Since April 5th, T-Mobile users have been able to activate a free tool on their smartphones designed to block scam calls. ... And as of April 11th, Windows Vista joins Windows XP as a computer operating system that Microsoft will no longer support with updates. Combined, those two systems are running on 9% of all computers. ... NordVPN says consumer inquiries about using a VPN to hide their web habits have risen 86% since congress passed a bill allowing internet providers to sell information about your web browsing history. 

Take our quiz and get smarter about spam and phishing.

Know what a "clone" is? How about a "whale?" Take our five question quiz and find out. 

Below is one of the most effective of all phishing attacks. You receive an email from someone you trust, instructing you to click on a link that takes you here.


Can you spot why filling out this Google login page will make your email account accessible to bad guys?

One last thing...

When cybercriminals can’t get to your place of business or home to make a personal connection in their attempt to “hack the human,” they use tactics like Phishing, Smishing, Pharming & Spam.  These tactics invade our lives and can be used to steal both corporate and personal information.


According to, damages to individuals and corporations currently exceed $1 billion dollars, due to the 100+ billion spam emails that are sent daily! No one is immune or fully protected from these scams since as many as 85% of organizations have been targeted. Of all the attacks perpetrated by hackers, spear phishing is the most successful.  Spear Phishing is an email that appears to be from an individual or business that you know, and thrives on familiarity.  Because the recipient is personally identified, it makes them more likely to trust the email. 


To understand these threats, learn how to achieve greater protection against Phishing, Smishing, Pharming & Spam, and to understand the tactics launched through Vishing (phone or voice mail attacks), go to the Global Information Security Team's MyLearning page (Cartus: MyLearning > Cartus MyLearning) to register for the upcoming WebEx virtual session on Wednesday, May 3rd at 11am.


Information Security is our shared responsibility to our shareholders, our customers, and to each other. You are the key to our success and we are here to support you.

We EDUCATE. So you can MITIGATE. Which helps keep us all SECURE.

SVP, Global Chief Information Security Officer, Nashira W. Layade

Original content, video and design © 2017 Aware Force LLC

Aware Force name and trademark © 2017 Aware Force LLC.