Network

Seasonal Scams: Valentine’s Day Edition

By |2020-02-14T14:04:46-06:00February 14th, 2020|Categories: Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , , |

Social media users should be wary of romance scams as Valentine’s Day approaches, TechRepublic says. Users of dating sites and apps are particularly at risk, and TechRepublic offers a list of tips from the FBI for staying safe from these scammers.First, stick to well-known dating websites that have good reputations. Scammers are present on these [...]

Ransomware Incident Blocks Law Firms From Their Trial Records

By |2019-11-04T14:14:05-06:00November 4th, 2019|Categories: Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

Reams of digital legal documents have been held hostage under a ransomware threat to a South Florida software company that manages electronic records for thousands of law firms nationwide. Earlier this month, TrialWorks began alerting its customers about the security breach and initially indicated it was caused by a Microsoft service outage affecting Outlook desktop [...]

Cybersecurity Awareness Month: SMB Edition

By |2019-10-24T15:04:40-05:00October 2nd, 2019|Categories: Security, Business, Cyber Security, Network|Tags: , , , , , , , , , , , , , , , , , , , , |

During the month of October, Cybersecurity Awareness Month reminds us of  category of crime tht continues to inflict companies and taxplayers with damages amounting in the billions of dollars every year. The only way to future-proof your business is by staying up to date on the latest threat landscape. To help you, here are five [...]

Phishing: A Threat to 2020 Elections

By |2019-07-11T08:58:42-05:00July 15th, 2019|Categories: Security, Cyber Security|Tags: , , , , , , , , , , , , , |

Homeland Security Warning About Phishing As A Threat to 2020 Elections Beware of phishing attempts! U.S Department of Homeland Security is warning top state election officials nationwide to safeguard against fradulent emails targeting state and local election.These emails appear as if they come from a legitimate source and contain links that, if clicked, will open [...]

Phishing Attacks Go Mobile

By |2019-06-26T10:47:22-05:00June 30th, 2019|Categories: Security, Business|Tags: , , , , , , , , , , , , , , , , |

Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications Taking advantage of of the deep-seated trust in mobile content, bad guys are using phishing text messages and look-alike sites to trick users into giving up their credentials. What happens is, you will get a text from “Microsoft” stating your Office 365 password has expired with a [...]

The Difference Between Diaster Recovery & Backups

By |2019-06-25T10:27:32-05:00May 29th, 2019|Categories: Business, Backup|Tags: , , , , , , , , , , , |

Let’s start with some definitions: Disaster Recovery (DR): A strategic security planning model that works to protect a company from the effects of natural or human-induced disasters, such as a tornado or cyber attack. A DR plan aims to maintain critical functions before, during, and after a disaster event, thereby causing minimal disruption to business continuity. [...]

[SCAM OF THE WEEK]: Notre Dame Disaster Causes FireStorm Of Social Engineering And Misinformation

By |2019-04-18T11:45:07-05:00April 30th, 2019|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , , , |

The Notre Dame Cathedral in Paris caught fire and was barely saved from total destruction. Millions of people visit every year and hundreds of millions feel a powerful, and personal, sense of connection to it. Seeing the cathedral burn was a tragedy, and the bad guys were faster than ever to leverage it into misinformation and social engineering. [...]

Malicious Business Email Campaign targets Banks and Financial Service Companies

By |2018-12-28T10:34:34-06:00December 31st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , , |

Researchers have spotted and tracked a new campaign aimed at tricking employees of US financial firms and banks into downloading Houdini Malware, a self-propagating malware strain. In addition to its C2 (command-and-control) functionality, the Houdini remote access trojan (RAT) possesses the ability to move laterally, leveraging removable drives. This malware does not possess a native ransomware component. However, [...]

[Scam Of The Week] New Sextortion Attacks Take A Dark Turn

By |2018-12-12T09:55:56-06:00December 15th, 2018|Categories: Security, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , |

New Sextortion Attacks Take A Dark Turn And Infect People With GandCrab Ransomware A recent report shows that last week, employees in the U.S have been bombarded by a spam attack! This attack pushes a double-whammy of a sextortion attempts combined with ransomware! Starting around May 2018, there have been a number of attack waves [...]

Password Sharing is not Caring

By |2018-10-09T12:00:22-05:00October 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , |

Cybercriminals thrive on misuse of credentials, and users sharing them only makes the criminal’s job easier.  According to a recent report, password sharing is running rampant. The password has been the long-standing guardian keeping unauthorized users from accessing data, applications, and systems they shouldn’t. But, the password is only powerful when the assigned user keeps it private. [...]