RCG

Seasonal Scams: Valentine’s Day Edition

By |2020-02-14T14:04:46-06:00February 14th, 2020|Categories: Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , , |

Social media users should be wary of romance scams as Valentine’s Day approaches, TechRepublic says. Users of dating sites and apps are particularly at risk, and TechRepublic offers a list of tips from the FBI for staying safe from these scammers.First, stick to well-known dating websites that have good reputations. Scammers are present on these [...]

New Year, Same W2 Phishing Scam

By |2020-01-23T15:57:35-06:00January 23rd, 2020|Categories: phishing, Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

New Phishing Attack Targeting ADP Users A phishing attack claiming to be ADP – one of the world’s largest HR and Payroll companies – telling you your W2 is ready! This recycled W2 phishing scam targets payroll and HR personel. It  appears to be from a corporte executive and typically begins with a friendly [...]

Cybersecurity Awareness Month: SMB Edition

By |2019-10-24T15:04:40-05:00October 2nd, 2019|Categories: Security, Business, Cyber Security, Network|Tags: , , , , , , , , , , , , , , , , , , , , |

During the month of October, Cybersecurity Awareness Month reminds us of  category of crime tht continues to inflict companies and taxplayers with damages amounting in the billions of dollars every year. The only way to future-proof your business is by staying up to date on the latest threat landscape. To help you, here are five [...]

Manufacturing and Construction Top Targets for Business Email Compromise

By |2019-08-12T15:36:08-05:00August 15th, 2019|Categories: phishing, Security, Business, Cyber Security|Tags: , , , , , , , , , , , , , , |

Business Email Compromise Doubles in Incidents and Triples in Cost The latest data from the U.S. government’s Financial Crimes Enforcement Network shows fraud via business email is changing tactics and becoming more effective. Phishing attacks don’t always need to result in the use of malware. In many cases the goal is to commit fraud through [...]

Phishing Attacks Go Mobile

By |2019-06-26T10:47:22-05:00June 30th, 2019|Categories: Security, Business|Tags: , , , , , , , , , , , , , , , , |

Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications Taking advantage of of the deep-seated trust in mobile content, bad guys are using phishing text messages and look-alike sites to trick users into giving up their credentials. What happens is, you will get a text from “Microsoft” stating your Office 365 password has expired with a [...]

The Difference Between Diaster Recovery & Backups

By |2019-06-25T10:27:32-05:00May 29th, 2019|Categories: Business, Backup|Tags: , , , , , , , , , , , |

Let’s start with some definitions: Disaster Recovery (DR): A strategic security planning model that works to protect a company from the effects of natural or human-induced disasters, such as a tornado or cyber attack. A DR plan aims to maintain critical functions before, during, and after a disaster event, thereby causing minimal disruption to business continuity. [...]

ROUSE CONSULTING GROUP, INC. ACQUIRES DCS COMPUTER SERVICES!

By |2019-04-11T10:29:36-05:00April 11th, 2019|Categories: Business|Tags: , , , , , , , , , |

We are pleased to announce the recent acquisition of DCS Computer Services of Davenport, IA. Please read the attached Press Release to learn more about the acquisition and what will happen within the next 3-6 months at RCG. This is an exciting time for everyone involved with the businesses. We appreciate the continued support and [...]