Crisis of Identify (Theft)

The Internet is a fertile hunting ground for bad guys looking to poach the personal and financial data of their prey. The Internet has also made it easier for these criminals to sell or trade this stolen information, while making it more difficult for them to be apprehended. Review the following guidelines from the U.S. government to learn how to avoid being a victim and how to respond if you think you were victimized. How to Minimize Your Risk ...

Anatomy of a Phish

We spend a lot of time talking about phishing emails and with good reason. With every passing day, phishing attacks are becoming more sophisticated, and consequently, we have seen their success rates improve. With this said, let’s take a closer look at a few example emails which claim to be from Microsoft and target Office 365 users:     As always, remember that if you have the slightest doubt or hesitation about an email or requ

Don’t Be The Weak Link!

One might think that the biggest risk to an organization’s information security is its technology,  but in fact, the biggest risk is the actions or inactions of its employees.  Human error has become a major weakness today and is one that is easily exploited by cyber criminals. In actuality, one study showed that almost 90 percent of cyber-attacks are caused by human error or behavior. To ensure that you are not your organization’s weak link, please rev

Security Breaches and Your Personal Information – How to Respond

As you may have seen in the news recently, 150 million users of Under Armour’s MyFitness Pal were the victims of a security breach. Obviously, Under Armour did not “protect their house”, but they are not alone.  If you look at some of the biggest hacks in recent history (Yahoo – 3 billion users,  eBay – 145 million users, Equifax – 143 million users, Target – 110 million users), it is safe to say that all of us have been affected or will soon be affe...

Using the Windows Key

In this entry, we will focus on some Windows tips that you may find useful. Specifically, we will look at utilizing the Windows Key. The Windows Key (the key containing the Windows logo normally located between the Alt and Ctrl keys) is a handy, often underutilized key on the keyboard. • The primary use for the Windows Key is for quickly accessing the Windows Start menu. If you are using Windows 8 or Windows 10, you can pin frequently-used programs to t...

Tax Time – Don’t Make It Hurt More Than It Has To

During tax filing season, the money of hard-working Americans is moving around at a brisk pace. And where there is money, there are scammers and ne’er do-wells who want to cheat good folks out of it. Being the height of “scam season”, the IRS has provide the following information to educate tax payers as to the potential pitfalls - https://www.irs.gov/newsroom/tax-scams-consumer-alerts. This site lists many of the existing scams that are out there. Some o

Spear Phishing Attacks – This Time It’s Personal

In November 2017, we discussed the dangers of email phishing scams and how to avoid becoming a victim. In this edition, we will look at a type of phishing attack called spear phishing. Spear phishing involves phishing attacks that target a particular individual or group of people within an organization. Spear phishing attacks can be difficult to identify as the messages are tailored which can add legitimacy. Many times, the potential victims are convinced...

Passwords – The Last Line of Defense

Passwords are often the last line of defense between the bad guys and your data, and unfortunately, following good password practices can be tough. Nowadays, almost every website requires us to create an account, and we all know how many websites and accounts that we utilize on a daily basis. At the same time, the existing computing power for cracking passwords is increasing, and massive data breaches keep exposing our accounts/passwords to the world at...

Email Security & Phishing Scams – Don’t Take The Bait!

Did you know that 60 percent of small businesses close after a cyber breach? Did you now that businesses with 1,000 employees or less have a 90 percent likelihood of having a data breach costing more than $216,000. This means that your company is squarely in the bulls-eye of the cyber bad guys. But there is hope. Statistics show that increased investment in employee training can reduce the risk of a cyber-attack by 45 to 70 percent. Phishing is defined as...

Cybersecurity Threats to Small-and-Medium-Sized Businesses (SMB)

With the burgeoning threat of ransomware and other cybersecurity attacks, companies are at greater risk than they have ever been. In 2017, ransomware attacks such as "WannaCry" and "NoPetya" dominated the news cycle for days at a time, and their devastating effects terrified business leaders the world over.  SMBs are now in the crosshairs of these cybercriminals. According to an SEC report, SMB's have become principal targets as their cyber defenses are of