Oct 29, 2021 | Cybersecurity
The Dark Web is not an ‘old wives’ tale’ or a story made up by the IT industry to sell more services. It’s a real online world that’s essentially a marketplace for cyber criminals. If they get their hands on stolen data, the Dark Web is the online ‘underground’ where...
Oct 4, 2021 | Cybersecurity
If you think that passwords are one of the fundamental pillars of modern security, then you’re absolutely correct. The problem is that this pillar is so full of cracks and other structural weaknesses that even a small gust of wind can send it tumbling to pieces....
Sep 27, 2021 | Cybersecurity
It’s true that we only hear about cybersecurity issues when they’re happening to big companies—like when Colonial Pipeline was hacked in May making both the national and local newspapers, and when a hacker recently stole more than 50 million customer records from...
Sep 3, 2021 | Phishing & Scams
Does your company have any social media profiles? It should. Even for strictly Business to Business (B2B) companies, LinkedIn should be kept up with at a minimum (and here’s why). But just like everything else in the IT world, benefits always come with risk. So...
Aug 30, 2021 | Cybersecurity
According to the Verizon 2021 Data Breach Investigations Report, credentials are the #1 way that a cybercriminal hack into an organization, with 61% of breaches attributed to leveraged credentials. That means that by way of clone phishing, domain spoofing or one of...
Aug 16, 2021 | Cybersecurity
Not that long ago, you would be happy if your mobile phone had enough memory to store 100 contacts, and you would be ecstatic if it could also store the same number of text messages. Today, your smartphone can not only store a virtually infinite number of contacts and...