Social Engineering/Phishing
Latest Posts from Our Blog
If you’re seeking ways to protect your business from hackers, a layered approach to cybersecurity is a non-negotiable foundation for your strategy. Much like how the house on the street with floodlights, security cameras, and an alarm system is not an easy target for burglars, we’ve found that businesses with multiple cybersecurity strategies in place…
Read MoreWhen we talk with business owners, we find that many are flying blind when it comes to cybersecurity. They know it’s important. They know there are threats. To take a comprehensive assessment of your IT security and protocols, you should ask yourself five questions: What are my assets? What are the threats to those assets?…
Read MoreCybersecurity attacks are on the rise and are growing increasingly sophisticated. According to the FBI, cybersecurity attacks have increased 400% since the start of the pandemic! With the average cost of a cyber attack totaling $149K, it’s a serious issue. Many business owners are left wondering how to prevent cyber attacks. An often overlooked aspect…
Read MoreSince the beginning of the pandemic, cybersecurity attacks have increased exponentially. While we often hear about high-profile attacks like the recent ransomware attack on huge companies like Kronos, the fact is that criminals are targeting small businesses as well. Cybersecurity risks are growing for small businesses more than ever. In a recent speech about top…
Read MorePeople getting scammed is nothing new. In fact, phishing is still the common most type of cyber-attack. Most people have heard of the Nigerian Prince scam. However, with advances in technology, there have been advances in scammer’s technology and tactics as well. Many have taken a liking to the form of scams called phishing attacks.…
Read MoreWhen it comes to passwords, people like to use the same passwords for pretty much everything they need to login to. It’s easy to remember and more convenient to do, but it’s actually one of the worst things you can do for your security online. In 2018, a total of 2.7 billion passwords were successfully…
Read MoreWhat is phishing? Phishing.org defines phishing as “A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.” This is a very common and…
Read MoreRecently, we have seen a dramatic increase in the amount of phishing cyber-attacks aimed at Office 365 users. It’s so bad that almost three quarters (71.4 percent) of corporate Office 365 users have at least one compromised account each month, according to a report by Skyhigh Networks. If you are not taking Office 365 security…
Read MoreYou are browsing the web, minding your own business, when suddenly a screen like the following pops up: You find yourself unable to open anything else or even close the Window. Clicking on “OK” does nothing and, sometimes, you even hear a voice from your speakers telling you that your computer is infected with something…
Read MoreRansomware still remains one of the most notorious forms of malicious attacks out on the internet, and won’t be going away any time soon. It now takes very little effort for someone to make their own Ransomware variant, as evident by all the new strains popping up every day. With so many variations, what steps…
Read More- « Previous
- 1
- 2
- 3
- Next »
Categories
- 5G & Mobile Networking (13)
- Backups & Business Continuity (17)
- Business (86)
- Cloud Backups (5)
- Cloud/Serverless Computing (5)
- Cybersecurity (91)
- Data Breaches/Leaks (16)
- Desktop Operating Systems (16)
- Desktop Software (20)
- DR/BCM Planning & Consulting (8)
- Email Software and Applications (7)
- Enterprise Resource Planning (ERP) (3)
- Featured (8)
- General Business (21)
- Hardware & Peripherals (9)
- Internet of Things (IoT) (8)
- Managed Anti-Virus/Anti-Malware (10)
- Managed Backups & Monitoring (15)
- Managed Services (25)
- Networking (72)
- News (17)
- Office Applications (6)
- On-Site Backups (6)
- Other (6)
- Passwords (5)
- Personal Computing (45)
- Press Releases (5)
- Ransomware (12)
- SandStorm News (12)
- Security Alerts & Vulnerabilities (14)
- Server & Server Hardware (2)
- Server Operating Systems (3)
- Servers (12)
- Social Engineering/Phishing (22)
- Software & Applications (14)
- Spyware/Malware/Viruses (16)
- Tips/Tricks/Shortcuts (27)
- Troubleshooting (3)
- Updates/Patches (7)
- Voice & Telephony (5)
- Wired Networking (13)
- Wireless/Wi-Fi (12)