Tech Support Scams and what to watch out for!

Don’t Get Fooled by Tech Support Scams   Are your employees trained to recognize tech support scams? These nefarious phishing attacks attempt to play on the trust you have established for reputable companies and scare you into giving up sensitive information.   Tech support scams are extremely common. Do you know how to recognize the signs?   It usually starts …

How Hackers Steal Your Business Data

How Hackers Steal Your Business Data   World Backup Day is March 31, so this is a perfect time to examine your cybersecurity strategy. What makes your business vulnerable? Hackers have many tactics they can use to infiltrate your network, and small to medium-sized companies are often the easiest to hack. Here are four ways hackers steal data:   1) …

Phishing……Tricky Tricky

Spear Phishing Gets More Sophisticated Elon Musk’s Tesla roadster is currently floating through space, most of us have a virtual personal assistant that lives in our pockets, and we’re having lengthy customer service conversations with chat bots. Technology has gotten more sophisticated in every way (aside from that printer that never seems to work). In this climate of innovation, hackers …

Spear Phishing – Avoiding the Trap

Phishing is an attack designed to trick Internet users into giving away confidential information, typically by sending an e-mail posing as a legitimate organization (like a financial institution) and linking to a website disguised as one associated with that institution. Spear phishing is a more sophisticated version of phishing that takes these attacks to the next level. Instead of sending …

Ransomware…..right in your backyard

Ransomware attacks continue to make headlines therefore, being proactive is critical. Hospitals, universities, SMBs and even government offices have found themselves a victims of these attacks. You must take every precaution against Ransomware attacks, especially as they become more and more frequent. In this climate of threats, it is necessary to add as many layers of protection as possible. That’s …