Voicemail Phishing – Don’t Listen!

By now, we have all seen countless Office 365 phishing emails and are becoming much more perceptive in identifying them. Now, with the increasing usage of voicemail-to-email, the bad guys are turning to voicemail-to-email messages to garner new victims.   Email similar to the following will be sent in an effort to either direct a user to a malicious website, entice the user to open a malicious attachment, deliver a ransomware payload, or steal ...

Workplace Security (of the Physical Variety)

In the 21st century, we spend a lot of time worrying about the hidden dangers that lurk in the unsettling nooks and crannies of cyberspace. In doing so, we sometimes neglect the tangible and do not pay attention to physical security. With this said, please see the following tips for physically securing your devices and work space. Device Locking Always ensure that you lock your devices when not in use. You can quickly lock your computer when leaving ...

Two-Factor Authentication – Keeping Ahead of the Bad Guys

Most of us know someone or have heard of someone who has had an online account compromised. Whether this person had a Facebook account, an email account, or even a bank account hacked, the bad guys gained access by obtaining the password through a phishing attack or other means. And when they obtained access, mayhem ensued. These account hacks are becoming more and more commonplace, but there is an option that all of us should embrace where possib...

Visual Real Estate

Ever want to better organize the windows on your monitor so that you can more easily view multiple windows at once? Windows 7 and Windows 10 have a little known feature available which allows you to “pin” your windows where they will only take up part of the screen. You simply move the Window as you normally would (by clicking/holding the top of the window) and drag it to the side of the monitor. When you see the highlighted area where the window...

Phishing Attacks are on the Rise!

We repeatedly focus on phishing attacks because they are increasing and their success rate is improving … big time. Primarily, we are seeing success for Microsoft Office 365 phishing attacks where the scam aims to get the user to enter their Office 365 email address and password. Once the user falls for this scam, the bad guys take control of the email account and send emails in an attempt to steal money from the company, its vendors, or its cu...

Crisis of Identify (Theft)

The Internet is a fertile hunting ground for bad guys looking to poach the personal and financial data of their prey. The Internet has also made it easier for these criminals to sell or trade this stolen information, while making it more difficult for them to be apprehended. Review the following guidelines from the U.S. government to learn how to avoid being a victim and how to respond if you think you were victimized. How to Minimize Your Risk ...

Anatomy of a Phish

We spend a lot of time talking about phishing emails and with good reason. With every passing day, phishing attacks are becoming more sophisticated, and consequently, we have seen their success rates improve. With this said, let’s take a closer look at a few example emails which claim to be from Microsoft and target Office 365 users:     As always, remember that if you have the slightest doubt or hesitation about an email or requ

Don’t Be The Weak Link!

One might think that the biggest risk to an organization’s information security is its technology,  but in fact, the biggest risk is the actions or inactions of its employees.  Human error has become a major weakness today and is one that is easily exploited by cyber criminals. In actuality, one study showed that almost 90 percent of cyber-attacks are caused by human error or behavior. To ensure that you are not your organization’s weak link, please rev

Security Breaches and Your Personal Information – How to Respond

As you may have seen in the news recently, 150 million users of Under Armour’s MyFitness Pal were the victims of a security breach. Obviously, Under Armour did not “protect their house”, but they are not alone.  If you look at some of the biggest hacks in recent history (Yahoo – 3 billion users,  eBay – 145 million users, Equifax – 143 million users, Target – 110 million users), it is safe to say that all of us have been affected or will soon be affe...

Using the Windows Key

In this entry, we will focus on some Windows tips that you may find useful. Specifically, we will look at utilizing the Windows Key. The Windows Key (the key containing the Windows logo normally located between the Alt and Ctrl keys) is a handy, often underutilized key on the keyboard. • The primary use for the Windows Key is for quickly accessing the Windows Start menu. If you are using Windows 8 or Windows 10, you can pin frequently-used programs to t...