Sep 27, 2021 | Cybersecurity
It’s true that we only hear about cybersecurity issues when they’re happening to big companies—like when Colonial Pipeline was hacked in May making both the national and local newspapers, and when a hacker recently stole more than 50 million customer records from...
Sep 3, 2021 | Phishing & Scams
Does your company have any social media profiles? It should. Even for strictly Business to Business (B2B) companies, LinkedIn should be kept up with at a minimum (and here’s why). But just like everything else in the IT world, benefits always come with risk. So...
Aug 30, 2021 | Cybersecurity
According to the Verizon 2021 Data Breach Investigations Report, credentials are the #1 way that a cybercriminal hack into an organization, with 61% of breaches attributed to leveraged credentials. That means that by way of clone phishing, domain spoofing or one of...
Aug 16, 2021 | Cybersecurity
Not that long ago, you would be happy if your mobile phone had enough memory to store 100 contacts, and you would be ecstatic if it could also store the same number of text messages. Today, your smartphone can not only store a virtually infinite number of contacts and...
Aug 2, 2021 | Phishing & Scams
A new phishing method has recently been identified and is now on the rise. And because of its well-crafted mimicking abilities, it’s hitting small business end users at an increasing rate. Consent phishing is a new technique that attackers are using in response to the...
Jul 27, 2021 | Cybersecurity
Of all the cybersecurity tools, tricks, software, and processes, none is more important than employee training. It must always be at the heart of your cybersecurity plan. That’s because no amount of cutting-edge technology can protect you from the one thing that is...