It’s been a cold month in Texas–an Arctic front covered most of the middle and southern American states in snow. Some parts of the southernmost state received over a foot of icy accumulation, and temperatures fell to single digits. While areas of the US can handle those conditions, Texas’s infrastructure was drastically unsuited to the… Read more »
Blog
Combo Phishing Attacks Target VPN
Everyone is familiar with the uptick in email phishing scams that have come with the COVID-19 pandemic. Workers and employers alike are adapting their security practices to defend company and consumer data. However, cybercriminals are adapting too. One group is combining phone calls and custom phishing sites to corporate VPN credentials. This group acts on… Read more »
Your Security Toolkit: Password Manager
With work-from-home becoming the new normal, companies are scrambling to adapt their security practices. Some are hiring an outside firm to handle their transition, while others are trying to cobble together an in-house solution. Security is difficult to maintain at the best of times, and 2020 is most definitely not the best of times. Security… Read more »
Homeland Security Gives SolarWinds Update
The SolarWinds Cyberattack: A Wake-Up Call for the Tech Industry In late 2020, a massive cyberattack targeted SolarWinds, a creator of popular networking software used by over 300,000 customers worldwide, including 412 Fortune 500 companies. Initially, many believed the attack focused on the software corporation and its high-profile clients due to malicious code embedded in… Read more »
Does Remote Work Impact Security?
Remote work has become a way of life for so many of us. It makes a lot of things harder. Communication, focus, and task management have all become more difficult. One of the things hardest hit by remote work is our online security. An overall increase in teleworking makes it harder for companies and workers… Read more »
VoIP: Risk and Reward
The Evolution of Workplace CommunicationWorkplace communication has changed significantly over the years. Online messaging services and email have become vital tools. However, the office phone has remained an essential part of communication for decades. Advancements in technology have transformed traditional phone systems, with Voice over Internet Protocol (VoIP) replacing landlines in many offices. VoIP systems… Read more »
Ransomware: Why You Shouldn’t Pay to Get Data Back
Ransomware attacks have been on the rise for years. The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses. These scams take several forms. The group could lock… Read more »
How Hackers Monetize Email Access and How to Protect Your Business
Cybercriminals are constantly finding new ways to infiltrate corporate data and systems. But what happens after they gain access? One of the most lucrative methods hackers use to profit from their breaches is by exploiting email services—leading to staggering financial losses. In fact, a recent report highlights how a hacker group leveraged compromised email accounts… Read more »
TA542: It’s Spear-Phishing Season Again.
When people think of spam emails, it’s usually phishing that comes to mind. These are the emails that make up your junk folder: a truly frightening combination of poor grammar, bad spelling, and vulgarity that makes you question how anyone can fall for a phishing attack. Spear-phishing has become the new way to create a… Read more »
Is Zoom Back in Business?
Work-from-home is the reality for so many of us during the coronavirus pandemic. Being out of the office has its challenges: interrupting kids, spotty internet, and endless miscommunications! However, online meetings have become the symbol of this new working environment, especially the virtual meeting app ‘Zoom’. Part of the app’s popularity was its security. Zoom… Read more »