The shift to BYOD
Public Sector Marketing 2.0
SEPTEMBER 24, 2013
Taking information learned and using it for social engineering schemes such as targeted phishing messages.
Tips From The E-Commerce World
JANUARY 24, 2017
I was fishing (not phishing) for some e-marketing tips and came across an article titled, Eight Myths E-Commerce Marketers Must Stop Believing In. Overall, the article is more pertinent to commercial marketers, but it did include a couple of points worth passing along. First, it was great to read about the acquisition myth: “Traditionally, most marketers were focused on top-of-the-funnel activities.
New Scams Claiming to Be the IRS - Aim for Nonprofits
Seeking Grant Money Today
FEBRUARY 14, 2008
Those who have received a questionable e-mail claiming to come from the IRS may forward it to a mailbox the IRS has established to receive such e-mails, firstname.lastname@example.org , using instructions contained in an article titled “ How to Protect Yourself from Suspicious E-Mails or Phishing Schemes.” More information on identity theft, phishing and telephone scams using the IRS name, logo or spoofed (copied) Web site is available on this Web site. From IRS.gov.