Think Twice Before Using Your Work Email Address as Login for Personal Accounts
Many companies have had their email credentials compromised without realizing it. In September 2016, researchers revealed that they found about 5 million unique business email credentials stored in hackers' dump sites and other underground cyber markets. When the...
Cybercriminals Are Posing as Job Applicants to Spread Ransomware
Be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it will...
Phishing scam hits close to home.
A few weeks ago, a client contacted us concerning a couple of emails they received. The client's company in question often transfers sums of money and has a CEO and CFO that aren't always in the office. These two factors, and some due diligence, almost paid nicely...
How to Avoid Falling Victim to Fake Malware Alerts
Suppose you are working on your computer and an alert pops up saying that your computer is infected with a virus. Could you tell whether this alert is legitimate? Don't feel bad if you said "no". Cybercriminals have become adept at creating fake malware alerts, so it...
8 Ways to Keep Your Office Virus-Free
New viruses and other malware pop up every day, and businesses are constantly on the defense trying to keep up. Not only are malware attacks exponentially higher than they were even a few years ago (and much higher than most people think), but the quality of the...
Your Webcam Might Be Spying on You
Spying on people through their computers' webcams might sound like a trick you would see in a James Bond movie, but it is a real threat in this digital age. Hackers, government agencies, and even a U.S. school district have been caught doing it. While some hackers spy...
11 Ways to Secure Your Business’ Wireless Network
Wireless networks are popular in small and midsized businesses because they are easy to set up and convenient to use. However, if a wireless network is not properly secured, hackers within range can access it and infiltrate your network.Here are eleven ways you can...
5 Ways to Protect Your Data in the Cloud
Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts...
Navigating the Slippery Slope of Social Media Policies
Businesses use IT policies to protect their assets and govern their employees. One policy that is often missing, though, is the social media policy. Having a social media policy is important, but writing one can be difficult because it needs to strike a balance...
Tricks That Cybercriminals Use to Scam Businesses
Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but rather with low-tech emails. The U.S. Federal Bureau of Investigation (FBI) refers to these attacks as Business Email Compromise (BEC)...