Blog
Scam Focus: Gift Card Purchase
Scenario: Donna is the supervisor of XYZ.org. Sam is an upper management employee. ******************************************************************** From: Donna Boss <DonnaBoss@scammer.com> To: Sam Scammed <SamScammed@XYZ.org> Subject: Quick Purchase Needed Sam, can...
A Few of Our Favorite Things
This week we will focus on some great resources that you should be looking at on a regular basis. If you don’t have an RSS...
Malware Focus: Dridex
Dridex is a form of malware, spread through the use of email, whose main goal is stealing banking credentials through the use of macros...
Internet Fraud
Internet fraud is an unfortunate byproduct of having worldwide access to resources, products and information. Among these risks are phishing scams, malware and...
You've Got Mail!
Phishing is the #1 cause of a compromise. 30% of phishing emails are opened. Business Email Compromise (BEC) scammers netted over $12 BILLION...
TLS 1.3
TLS (Transport Layer Security) v 1.3 has recently been approved by the Internet Engineering Task Force (IETF) and the seemingly minor upgrade from version 1.2...
Are You Backing Up Your Data?
Backup and restore processes are a critical component of your business continuity and disaster recovery plans. In order to ensure that your process is successful...
Malware Focus: TrickBot
TrickBot is a banking Trojan that targets the Windows operating system. The Trojan's focus is to steal banking information and is spread...
The Verizon 2019 Data Breach Investigations Report
The Verizon 2019 Data Breach Investigations Report (DBIR) has been released. This report is built on the analysis of over 41,000 security incidents and...
Hacked!
Hackers have devious ways of infiltrating your system and stealing your data. Crooks aren’t always after the biggest fish in the sea but instead rely...
Combine Assessments and Pay Only One Travel Fee
Combine Assessments and Pay Only One Travel Fee
Summer is a great time to assess your technology infrastructure and make...
Protecting Personal Data
One big risk of identity theft is that a crook might take out loans or open credit cards in your name and then never pay...
Cyber Law
Cyber law applies to Internet and Internet related technologies. Cyber crime can target individuals, businesses, property and government. It can include harassment, stalking, identity theft,...
If It's on the Internet
If it’s on the Internet it must be… …True …Free …Safe …Cheaper True? If you think about it, we all have the ability to ‘break the news’ of the latest...
MFA vs. 2FA
Multi-Factor Authentication (MFA) vs Two-Factor Authentication (2FA) In an effort to make password authentication more secure it is necessary to implement technology to strengthen the process. Simply...