Security Concerns with LastPass

Posted by - January 05, 2023

In general, it’s a good thing to be using a password manager to generate a strong, unique password and to keep track of all of your passwords. For many of OptfinITy’s clients, the password manager that has been used has been LastPass – something we ourselves have been using since 2013. Over the past 6… Read more »

The Latest Social Engineering Scam

Posted by - December 01, 2022

Phone call spam has slowly transitioned towards text message scams over the years. One of the latest texting scams has become known as “Pig Butchering”. The method involves “finding a target, fattening up the target, building trust with them, and then taking advantage of them and slaughtering the pig,” according to John Haraburda, director of… Read more »

How Changes to the Microsoft Donation Program will Affect You

Posted by - March 17, 2022

If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates.  However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »

What are the Cybersecurity Threats Facing the 2022 Winter Olympics?

Posted by - February 15, 2022

Cybersecurity apprehensions surrounding the Olympics have been prevalent for the past few Olympic games, but the 2022 Beijing Winter Olympics have brought on a new set of concerns as it relates to technology. In 2020, the Tokyo Olympics incurred over 450 million cyber-related incidents, far superseding the number seen during the 2012 London Summer Olympics…. Read more »

Are Scammers Watching your Donations this Holiday Season?

Posted by - December 20, 2021

It’s giving season! As the holidays roll around this year, there are plenty of reasons to give back to your community. Americans donated $471.44 billion in 2020, an over 5% increase from 2019. Unfortunately, scammers are well aware of the uptick in charitable donations, and will likely target those altruistic efforts for their own self… Read more »

Don’t Fall Victim to Cybercrime

Posted by - September 29, 2021

Cybersecurity Awareness Month 2021: Week 4   Cybercrime has risen immensely since the onset of the coronavirus pandemic, largely due to the sudden sharp increase in employees working remotely. This month, we focused on both email and mobile phishing attacks, as 36% of successful corporate cyberattacks have involved phishing. Already, hackers have ransomed millions of… Read more »

Healthcare’s Struggle with Cybersecurity

Posted by - August 20, 2021

The healthcare industry has become more important than ever during the coronavirus pandemic, as the majority of Americans have had to interact with a provider in order to get a coronavirus vaccine, test, or care.  This has resulted in an influx of personal medical information to these institutions. That coincided with a global increase in… Read more »

What is V2X Technology?

Posted by - August 10, 2021

Self-driving cars have become an iconic part of the early 21st century.  Tech companies like Uber, Google, and Apple have all made forays into self-driving vehicles to media fanfare.  Self-driving car company Tesla has a legion of devoted fans, partially due to CEO Elon Musk’s purposeful cultivation of that base, and the stock price to… Read more »

Olympic Hurdles: Track Event or Cybersecurity Concern?

Posted by - August 04, 2021

The 2020 Summer Olympics are finally here! After a year of waiting, your favorite Olympians are taking the world stage. With over 200 countries competing, it’s sure to be a must-watch event. Unfortunately, as one of the first global events to occur since the pandemic, this also makes Tokyo a prime target for cyberattacks. It… Read more »

Filipino Government Suffers Major Data Breach

Posted by - July 20, 2021

Data breaches are devastating for an organization.  Like any cyberattack, a data breach requires an immediate response.  The victim has to identify the scope and scale of the breach, whether it is limited to a data breach or whether other systems were affected, and take steps to prevent further access from the perpetrator.  Some data… Read more »