Social Engineering/Phishing
Latest Posts from Our Blog
What is phishing? Phishing.org defines phishing as “A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” This is a very common and…
Read MoreWhen it comes to passwords, people like to use the same passwords for pretty much everything they need to login to. It’s easy to remember and more convenient to do, but it’s actually one of the worst things you can do for your security online. In 2022, over 24 billion passwords were successfully hacked. Using…
Read MoreYou are browsing the web, minding your own business, when suddenly a screen like that pops up. You find yourself unable to open anything else or even close the Window. Clicking on “OK” does nothing and, sometimes, you even hear a voice from your speakers telling you that your computer is infected with something truly…
Read MoreIn today’s digital age, passwords serve as the frontline defense for our online identities and sensitive information. However, despite the numerous data breaches and hacking incidents, many individuals still underestimate the importance of unique and strong passwords. One common yet perilous practice is password reuse, which involves using the same password across multiple accounts. In…
Read MoreChances are, if you have used any popular social media platforms recently, you have been exposed to social media bots. By definition, this is not necessarily a bad thing, since these bots are just accounts on social media which are run automatically by a computer program rather than a human. However, most benign bots are…
Read MoreThe best way to combat computer infections is to NEVER connect to the internet. Of course, this is not a desired or viable option for most people. But unfortunately, the internet is the most common way of receiving or transmitting infections. Luckily, a mix of the right software and knowledge can go a long way…
Read MoreWhat is Phishing? This varies from the specific type of phishing, but in general, phishing is the act of tricking and manipulating a user to reveal information to the attacker through various means. Tools of the trade can range from malware laced documents, to websites with URLs that are spelled similarly to popular services that…
Read MoreWhat is social engineering? Social engineering involves manipulating users to give confidential information to people who should not have access to it. Common targets include banking and credit card info, passwords, social media access & computer access. The reason they resort to social engineering is that it’s much easier to trick a human than to…
Read MoreThere has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy. We’ve all heard of folks hit by identity theft. And, yes, sometimes that comes from hackers and the…
Read MoreThe holiday shopping season is coming up, which means you’re probably spending more time shopping online than at any other time of the year. In today’s post, we’ll go over some of the common scams and give some tips to avoid being scammed this time of the year. Fake Websites In the next few months,…
Read MoreCategories
- 5G & Mobile Networking (13)
- Backups & Business Continuity (18)
- Business (86)
- Cloud Backups (5)
- Cloud/Serverless Computing (5)
- Cybersecurity (92)
- Data Breaches/Leaks (16)
- Desktop Operating Systems (16)
- Desktop Software (20)
- DR/BCM Planning & Consulting (8)
- Email Software and Applications (7)
- Enterprise Resource Planning (ERP) (3)
- Featured (8)
- General Business (21)
- Hardware & Peripherals (9)
- Internet of Things (IoT) (8)
- Managed Anti-Virus/Anti-Malware (10)
- Managed Backups & Monitoring (15)
- Managed Services (25)
- Networking (71)
- News (16)
- Office Applications (6)
- On-Site Backups (6)
- Other (6)
- Passwords (5)
- Personal Computing (45)
- Press Releases (5)
- Ransomware (12)
- SandStorm News (11)
- Security Alerts & Vulnerabilities (14)
- Server & Server Hardware (2)
- Server Operating Systems (3)
- Servers (12)
- Social Engineering/Phishing (23)
- Software & Applications (14)
- Spyware/Malware/Viruses (16)
- Tips/Tricks/Shortcuts (27)
- Troubleshooting (3)
- Updates/Patches (7)
- Voice & Telephony (5)
- Wired Networking (13)
- Wireless/Wi-Fi (12)