Social Engineering/Phishing
Latest Posts from Our Blog
There has been a lot of local news and buzz lately about phishing activities and not the ones where you catch dinner! Emails, websites, and even telephone calls can be phishing expeditions by the less than trustworthy. We’ve all heard of folks hit by identity theft. And, yes, sometimes that comes from hackers and the…
Read MoreThe holiday shopping season is coming up, which means you’re probably spending more time shopping online than at any other time of the year. In today’s post, we’ll go over some of the common scams and give some tips to avoid being scammed this time of the year. Fake Websites In the next few months,…
Read More2021 was a record year for cyber attack activity. The number of launched attacks is growing by the year. In today’s post, we’ll review the 5 Most Surprising Cybersecurity Stats for Small Business, and we’ll dive into some things you can do to avoid becoming another statistic. In 2021, There Were 50% More Cyber Attacks…
Read MoreYou can spend countless dollars on sophisticated anti-malware & firewall systems, but the weakest link will always be the human mind. It’s much easier to trick a human to reveal information than trying to force a computer system into doing it. With that in mind, our topic for today’s blog post deals with training employees…
Read MoreIn today’s rapidly changing business environment, cybersecurity threats to small businesses are becoming more common than ever. With the wide array of threats, your business needs to be prepared on all fronts. In this post, we’ll cover 8 of the most common IT security risks to your business and how Managed Services can assist with…
Read MoreWhen we get an email from a prince in a foreign country asking us to wire money, most of us identify that scam pretty quickly. Unfortunately, the world of scam emails has become much more sophisticated, and not everyone knows how to tell if an email is a scam. Now hackers are using malicious links…
Read MoreIf you’re seeking ways to protect your business from hackers, a layered approach to cybersecurity is a non-negotiable foundation for your strategy. Much like how the house on the street with floodlights, security cameras, and an alarm system is not an easy target for burglars, we’ve found that businesses with multiple cybersecurity strategies in place…
Read MoreWhen we talk with business owners, we find that many are flying blind when it comes to cybersecurity. They know it’s important. They know there are threats. To take a comprehensive assessment of your IT security and protocols, you should ask yourself five questions: What are my assets? What are the threats to those assets?…
Read MoreCybersecurity attacks are on the rise and are growing increasingly sophisticated. According to the FBI, cybersecurity attacks have increased 400% since the start of the pandemic! With the average cost of a cyber attack totaling $149K, it’s a serious issue. Many business owners are left wondering how to prevent cyber attacks. An often overlooked aspect…
Read MoreSince the beginning of the pandemic, cybersecurity attacks have increased exponentially. While we often hear about high-profile attacks like the recent ransomware attack on huge companies like Kronos, the fact is that criminals are targeting small businesses as well. Cybersecurity risks are growing for small businesses more than ever. In a recent speech about top…
Read More- « Previous
- 1
- 2
- 3
- Next »
Categories
- 5G & Mobile Networking (13)
- Backups & Business Continuity (19)
- Business (87)
- Cloud Backups (5)
- Cloud/Serverless Computing (6)
- Cybersecurity (95)
- Data Breaches/Leaks (18)
- Desktop Operating Systems (16)
- Desktop Software (20)
- DR/BCM Planning & Consulting (8)
- Email Software and Applications (8)
- Enterprise Resource Planning (ERP) (3)
- Featured (8)
- General Business (21)
- Hardware & Peripherals (9)
- Internet of Things (IoT) (8)
- Managed Anti-Virus/Anti-Malware (10)
- Managed Backups & Monitoring (15)
- Managed Services (25)
- Networking (71)
- News (16)
- Office Applications (6)
- On-Site Backups (6)
- Other (6)
- Passwords (5)
- Personal Computing (46)
- Press Releases (5)
- Ransomware (12)
- SandStorm News (11)
- Security Alerts & Vulnerabilities (14)
- Server & Server Hardware (2)
- Server Operating Systems (3)
- Servers (12)
- Social Engineering/Phishing (24)
- Software & Applications (14)
- Spyware/Malware/Viruses (16)
- Tips/Tricks/Shortcuts (27)
- Troubleshooting (3)
- Updates/Patches (7)
- Voice & Telephony (5)
- Wired Networking (13)
- Wireless/Wi-Fi (12)