Tag: Security
-
Restart your phone for security? The NSA says, Yes!
We like to say the internet is no longer a kind and friendly place. Security specialists fight every day an ever changing threat landscape, and you, as the users, see this by stronger, more complicated security requirements. But what if I told you to boost your mobile phone security all you need to do is…
-
Strengthening the Digital Fortress: The Importance of Cybersecurity
It’s been a year since we last posted. We’ve been busy this year revamping our setup to better serve you, the clients. To speed things along, we tried out ChatGPT for this blog post. Let’s see how it did. Introduction: In today’s interconnected world, where technology permeates every aspect of our lives, the need for…
-
Does your company have a kill switch?
Let’s consider this scenario: You have a house. You often hire people to clean, maintain,fix, and improve that house. Every person you hire needsaccess to the house. But it’s inconvenient to let them inevery single day, maybe even multiple times a day. So yougive them all a key to the same lock, to let themselves…
-
Psychology of Passwords
Are user behaviors putting your business at risk? Inevitably, the answer is always “yes”. But some of the risk can be avoided and users can be made more resilient through coaching, training, and a little bit of psychology. A resounding number of users know and admit that they hold a stake in data and network…
-
Warn Your Users: COVID-19 Vaccine Scams are on the horizon
A COVID-19 vaccine is expected to be approved by the FDA this week. While there is plenty to be excited about, there is cause for concern. Information Technology attack vectors have been known to use big news, fads, and trends to trick users. A COVID-19 vaccine will be the biggest news in over a decade……
-
What is DKIM?
DomainKeys Identified Mail, or DKIM, lets an organization take responsibility for a message that is in transit. Got it? Great. If you don’t understand, no worries, we’ll explain. To understand DKIM and why it exists, you first have to understand the problem. Emails are more like letters in the mail than most people believe. I…
-
Ransomware – How bad can it get?
Let us start this conversation with a simple line: no business is too big or too small to be a target for ransomware. It is simple to think that a network of only a couple of computers is not a lucrative target for a hacker, and you would be right if that hacker had to…
-
What Does EOL Mean?
EOL stands for End-of-Life in the IT industry. Because the IT landscape is constantly changing, including newer technologies and new threats, computer software and hardware must constantly change. Eventually there comes a time when the developers need to move on from their older products to further develop new products, and thus an End-of-Life is announced.…
-
Tips for Protecting Your Network 2019
In 2018 we saw a 350% increase in ransomware attacks, a 250% increase in spoofing or business email compromise, and a 70% increase in spear-phishing attacks. (IndustryWeek) The reason? More and more hackers are compromising networks and systems, and demanding more and more money. The average cost of a breach for Small Businesses? $120,000. Enterprise?…
-
Lying Sextortion Scammers Sending Victims Their Own Hacked Passwords
Scammers have made well over $250,000 in Bitcoin by duping users into believing they’ve been caught watching porn via their webcam. Online scammers have been innovating of late. In the last month, one group of ne’er-do-wells has sent out spam emails telling recipients they’ve been caught watching porn through their webcam, and if they don’t pay, all…