How to Spot Email Spoofing

 The number of emails we get daily can be overwhelming. We could be excused for not looking at them all closely – well, almost. Except that not taking care to review emails for signs of spoofing could be a real risk to your business. Learn about email spoofing and how to avoid it in this article. How to Spot Email Spoofing First, what is email...
Continue reading
  204 Hits
204 Hits

Don’t Get Reeled in by Christmas Phishing Attacks

We expect the holiday season to be a time of good cheer, and peace and goodwill to all, right? Except cyberattackers didn't get the memo. They are more likely to attack businesses with phishing attempts during the holidays. Prevent issues by knowing what to expect. Cybercrime research shows the season "dramatically impacts" the volume of phishing a...
Continue reading
  309 Hits
309 Hits

What Not to Do on a Work Computer

Working from home has its advantages but can also blur the line between professional and personal time. Plus, employees may grow more relaxed about what they do on their work computer while remote. This article shares things employees should avoid doing on work computers, whether remote or in the office. What to avoid doing when working remotely Lo...
Continue reading
  356 Hits
356 Hits

Delivering SMS “Smishing” Scams

Smishing is high up on the list of words that do not sound as intimidating or threatening as they should. Smashing the word fishing together with the "SM" for short messaging service (aka text), smishing is a cyberscam. Especially with online shopping skyrocketing during the pandemic, delivery smishing has gained traction. Don't fall victim to...
Continue reading
  262 Hits
262 Hits

What You Need to Know about Security Testing

You want to keep your IT in top shape. Your business technology supports both your productivity and profitability. You don't want to be dealing with downtime. You also want to avoid running afoul of any industry regulations or standards. But how does a business gauge IT fitness? That's where IT audits, security assessments and penetration testing c...
Continue reading
  345 Hits
345 Hits

How Hackers Get Around SMS Two-Factor Authentication

Every time you're online and a site sends a separate code to check your identity, you're using two-factor authentication. It's become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe. With billions of usernames and passwords leaked, access credentials everywher...
Continue reading
  285 Hits
285 Hits

Everyone Plays a Role in Cybersecurity

Hollywood would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by James Bond's tech guru, Q. Yet in real life, most hacks are nothing like that. Cybercriminals often simply fool a human to gain access. Phishing remains a primary way to attack. A scammer sends an email that looks legitimate...
Continue reading
  362 Hits
362 Hits