by Gene Reich | Nov 4, 2025 | Cybersecurity Threats, Ephemeral Messaging, Help Desk Verification, Identity Verification
How identity checks inside ticketing systems are redefining cybersecurity’s weakest link. The modern help desk is built to solve problems quickly. And that’s a good thing. We all want our customers or employees to experience as little friction in their...
by Peter | Oct 3, 2025 | Cybersecurity Threats, MFA, Secure Communication
A few days ago, my wife received an email from a rather large airline. And there’s a good chance you, or someone you know, has received a similar email. It usually sounds something like this:”We’ve been hacked… so that also means that you’ve been hacked....
by Gene Reich | Sep 26, 2025 | Cybersecurity Threats, Cybersecurity Trends, Identity Verification, MFA
Help desks remain one of the most common points of attack in cybersecurity. When someone calls in to request a password reset or access change, technicians often rely on phone calls or email confirmations to decide whether the request is legitimate. Attackers know...
by Gene Reich | Sep 8, 2025 | Cybersecurity Threats, Cybersecurity Trends, Secure Communication
The Long Shadow of a 1970s Convenience In 1971, a computer engineer named Ray Tomlinson was working on ARPANET, the experimental network that would later evolve into the internet. As part of a small side project, he typed out a test message and sent it from one...
by Gene Reich | Sep 2, 2025 | Cybersecurity Threats, Cybersecurity Trends, Pretexting, Secure Communication, Social Engineering
The rising cost of verification Every organization now runs a quiet economy of verification. Before a password is reset, a vendor changes banking details, or a finance approval is granted, someone must decide if the person on the other end is who they claim to be....