Blog

Blog2019-01-03T16:16:03-05:00

Manufacturing and Construction Top Targets for Business Email Compromise

By |August 15th, 2019|Categories: phishing, Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , |

Business Email Compromise Doubles in Incidents and Triples in Cost The latest data from the U.S. government’s Financial Crimes Enforcement Network shows fraud via business email is changing tactics and becoming more effective. Phishing attacks [...]

Phishing: A Threat to 2020 Elections

By |July 15th, 2019|Categories: Security, Cyber Security|Tags: , , , , , , , , , , , , , |

Homeland Security Warning About Phishing As A Threat to 2020 Elections Beware of phishing attempts! U.S Department of Homeland Security is warning top state election officials nationwide to safeguard against fradulent emails targeting state and [...]

Phishing Attacks Go Mobile

By |June 30th, 2019|Categories: Security, Business|Tags: , , , , , , , , , , , , , , , , |

Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications Taking advantage of of the deep-seated trust in mobile content, bad guys are using phishing text messages and look-alike sites to trick users into giving up their [...]

The Difference Between Diaster Recovery & Backups

By |May 29th, 2019|Categories: Business, Backup|Tags: , , , , , , , , , , , |

Let’s start with some definitions: Disaster Recovery (DR): A strategic security planning model that works to protect a company from the effects of natural or human-induced disasters, such as a tornado or cyber attack. A DR [...]

Load More Posts

Tags

Categories

Archives