Internet Security – Common Misconceptions

Many misconceptions exist about what constitutes “safety” on the Internet, but don’t believe everything you hear. The bad guys are always looking for an angle, so we cannot become complacent and must always remain vigilant.  With this said, please review these common Internet safety myths: If I see the lock icon, I am safe.Just because you see the lock icon in your browser, do not assume that your connection is secure. Yes, ...

Time to Study – Back-To-School Scams

We are all familiar with the expenses incurred when our kids go back to school, and we all are interested in “good deals”. Well, scammers are aware of this as well and are always looking to part you from your money. Webroot (a leading antivirus provider) provides the following tips to consider in order to avoid these scams: SMS Giveaways and Freebies Congratulations! You’ve just received a text message ...

The Danger of Digital Clutter

We all have some degree of clutter in our lives. Whether we are talking about untouched, dust-covered boxes sitting in the garage, stacks of documents and mail strewn about the house, or clothes that you will absolutely never wear again. In the 21st century, we also have tons of “cyber clutter” such as unused email/social media accounts, old computers or devices, obsolete hard/flash drives, or antiquated documents to name a few. The problem with...

Weighing the Phish

Phishing attempts are getting better and better. The bad guys are now sending messages from hacked accounts which can lend credibility to the authenticity of the email.  If you are not expecting an email from sender, disregard the request or validate the request by reaching out to the sender via published contact information.  Remember: When in doubt, don’t act on it. It’s simply not worth it.With that said, let’s take a look at an actual p...

Phishing Off the Company Pier

Phishing attacks are rising at an alarming rate for companies across the globe. A respected cybersecurity company recently released the following statistics regarding this increase: • Email-based corporate credential phishing attacks quadrupled vs. the previous quarter. • 99% of the most highly targeted email addresses in the quarter didn’t rank as such in the previous report, which suggests attackers are constantly shifting targets....

Stay Educated – Stay Safe

As we regularly mention, you, the user, are the most important line of defense in protecting against cyber-attacks. Since user education is so critical in protecting businesses and individuals, the National Cyber Security Alliance created a website, https://staysafeonline.org, to arm users with the knowledge that they need to stay secure. We recommend that you visit this site periodically to stay abreast of the most current cybersecurity tip...

Phishing, Phishing, and More Phishing

According to a recent report, business email phishing attacks increased a whopping 476% year-over-year and credential phishing attempts quadrupled quarter-over-quarter. Even worse is that these attacks are having huge success and costing companies a lot of money. Companies will employ various electronic safeguards, but you are the most important line of defense, so THINK BEFORE YOU CLICK! Follow these tips to protect yourself and your company: ...

The Gift Card Scam – It’s the thought that counts.

A phishing scam involving gift cards is becoming more prevalent and is having surprising success. The scam works like this. The recipient will receive an email that purports to be from a “higher-up” in the company, requesting him to urgently purchase some gift cards (normally Apple or Google Play). After the cards are purchased, the scammer asks the victim to send him the codes off of the back of the card. Then the scammer goes shopping.Let’s take a l...

Voicemail Phishing – Don’t Listen!

By now, we have all seen countless Office 365 phishing emails and are becoming much more perceptive in identifying them. Now, with the increasing usage of voicemail-to-email, the bad guys are turning to voicemail-to-email messages to garner new victims.   Email similar to the following will be sent in an effort to either direct a user to a malicious website, entice the user to open a malicious attachment, deliver a ransomware payload, or steal ...

Workplace Security (of the Physical Variety)

In the 21st century, we spend a lot of time worrying about the hidden dangers that lurk in the unsettling nooks and crannies of cyberspace. In doing so, we sometimes neglect the tangible and do not pay attention to physical security. With this said, please see the following tips for physically securing your devices and work space. Device Locking Always ensure that you lock your devices when not in use. You can quickly lock your computer when leaving ...