How to Use the iPhone Screen Recording Feature

Have you ever had a call from your in-laws asking for help on how to use a feature or app on an iPhone? What if you are at work and you receive a call from your “remote-learning” child who needs help with a phone, iPad, or iPod Touch related to a school assignment? Verbally assisting them can be difficult, and it can be even more cumbersome to send them numerous screenshots. Well, the excellent new iPhone Screen Recording feature (available in iOS 11 or l...

The Human Touch

Recently, Twitter saw the accounts of some its most famous account holders (Elon Musk, Bill Gates, Barak Obama, Kanye West and more) hacked and used to push out a Bitcoin scam. When all was said and done, the attack generated more than $100,000 in proceeds for the bad guys. The attack was initiated by a 17-year-old from Florida who was able to gain access to Twitter’s systems through social engineering and phishing … an approach which was not technology-b...

Think Before You Click

All of us have the tendency to get in a hurry when doing our jobs, especially when going through the copious amounts of emails that we receive on a daily basis. Whether we are trying to catch up on the emails that accumulated over our vacation, or we are just trying to manage our normal workload, our mouse can occasionally outpace our brain.   With this said, be sure to slow down and evaluate each email carefully before taking action. One bad click can ha...

Phishing Emails – The Single Best Defense

The majority of phishing emails have the objective of stealing your email account password, so that the bad guys can impersonate you and then steal money from you, your company, your customers, or your vendors.   We regularly cover the ways in which we can identify a phishing email (click to review a blog entry on identifying phishing attempts), but there is one sure-fire way to avoid having your account compromised. If you are ever prompted to en...

Zoom Credentials Compromise – What You Should Know

As the world shifted to using video conferencing tools during the pandemic, the widely-used Zoom platform came under fire for multiple security issues. One of these concerns is that 500,000 Zoom account credentials recently became available on the dark web. This account information was not stolen from Zoom, but the bad guys got their hands on credentials stolen from other sites and then tried those username/passwords on Zoom (a technique called “credentia...

2020 Threat Report – Highlights

Webroot, the trusted antivirus provider utilized by NetAscendant, recently released their 2020 Threat Report which includes some interesting and helpful information.Please see the following highlights from this report and tips on how to avoid becoming a victim: Consumer PCs remain nearly twice as likely to get infected as business PCs.With many people working from home and on personal computers during the pandemic, be sure to confirm that your system i...

Avoiding Coronavirus Phishing Scams

As concern increases regarding the coronavirus outbreak, the bad guys are increasing their efforts to part you with your data and/or money. The following article from Consumer Reports does a good job in describing these scams and providing tips:  https://www.consumerreports.org/phishing-vishing/how-to-avoid-coronavirus-phishing-scams/With this said, let’s also review some of the main tips in avoiding a phishing attack: If you are ever...

“There is nothing more deceptive than an obvious [FAX].”

Sir Arthur Conan Doyle actually said “There is nothing more deceptive than an obvious fact.” in one of his Sherlock Holmes stories. In other words, perceived facts can be misleading, and we shouldn’t believe everything we see without thinking it through.This quote is certainly true when it comes to phishing attempts. Bad guys are counting on users acting without thinking. With this said, we are seeing numerous “fax-based” scams which have...

Windows 7 – R.I.P.

Yesterday (1/14/2020) was the last day of Windows 7’s illustrious life. We bid farewell to an operating system that will be missed and was beloved by those who knew it. It had a long life of 10 years and we will cherish the memories.   As previously mentioned, NetAscendant is assisting our customers in upgrading/replacing their existing Windows 7 business machines but strongly recommends that users take immediate action on any home machi...

What’s Hot in Phishing?

To clarify upfront, this is not an article on the hottest bass lakes in Texas or what color crankbait is hauling in the lunkers. The fishermen in the audience may have quit reading, but we wanted to take a few minutes to talk about the phishing attacks that we are seeing the most. The two most common at the current time are the gift card scam and the voicemail scam. Please see the following for a refresher on these two surprisingly effective c...