This New Social Engineering Scam “Fattens You Up” Before the Slaughter
One of the most disgusting aspects of cybercrime is just how easy it is for criminals to make a killing from it.
Ransomware — A Top Small Business Security Vulnerability
If your business hasn’t yet experienced a ransomware attack, but you aren’t actively preventing one, you’ve been very lucky. But luck has a way of running out.
Holiday Cybersecurity Best Practices
It’s tough to find someone who doesn’t enjoy the holiday season. Unfortunately, cybercriminals love them for many of the same reasons we do. We’re traveling more, we’re busy and distracted, we buy more online from merchants we don’t know well, and we’re especially inclined to giv…
Why Care About Multi-Factor Authentication?
It’s safe to say that Multi-Factor Authentication (MFA) isn’t popular. According to Microsoft, only 22% of their enterprise customers use it, and many people seem to associate it with annoyance. Unfortunately, strong and unique passwords just don’t cut it anymore, and if we’re be…
The Top Cybersecurity Threats for Small Business
Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be worth it” mindset may be somewhat true for many forms of crime, but unlike most physical security threats, the most common cyberattacks are executed in bulk quickly a…
Are VPNs Obsolete Technology?
Too soon? You might have guessed that if this question is being asked by tech pros, the answer is probably yes. I recognize this might be unwelcome news for many. A VPN, or Virtual Private Network, looked like the clear choice for a lot of companies looking to accommodate hybrid …
What You Need To Know About Recent Apple Updates for Vulnerability
Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…
What Is Your Incident Response Plan?
What is your Incident Response Plan? An Incident Response Plan (IRP) should contain everything your organization will do in the event of a security incident. A Disaster Recovery Plan (DRP) and an IRP are essential components of a Business Continuity Plan (BCP).
What Is Smishing and Why Is It a Problem?
Smishing is much like traditional phishing scams, except these messages are sent by text (SMS) instead of email. Typical smishing messages urge recipients to click on a link that scammers say will contain a survey, a prize, or urgent information about a bank account or credit car…
Mobile Device Security 101
As hybrid and remote work soared during the pandemic, so too did the use of mobile devices. Finally workers could access sophisticated digital tools from anywhere, and on any device. With the right security tools and procedures in place, it’s a win/win for businesses that needed …