Are Longer Passwords Safer Against Cyber Attacks?

Posted by - February 05, 2024

A 16-character password may be just as susceptible to a hacking attempt as a short password, according to a recent Specops Software report. Using easily guessable, duplicate, and simple passwords may make it easier for you to remember, but it also makes it easier for hackers to hijack your accounts. With a booming market for… Read more »

Microsoft’s Response to Midnight Blizzard Data Breach

Posted by - February 02, 2024

Immediate Response and Detection On Friday Microsoft released an official statement on its actions following a cyber breach by Nation State Actor Midnight Blizzard against its corporate systems. This breach raises concerns about the ongoing threat from nation-state actors and highlights potential shortcomings in Microsoft’s cyber practices. Common issues such as poor password management and… Read more »

The QR Code Quishing Threat: Unraveling the Risks

Posted by - January 19, 2024

Despite having 2FA enabled, Mandiant, a Google-owned company, was recently the victim of a cyber-attack against their Twitter account with over 100,000 followers. To appear more legitimate, the hackers renamed the account “Phantom” and updated the bio to pose as the Phantom Cryptocurrency wallet. The hackers then used the account to promote links to a… Read more »

Combo Phishing Attacks Target VPN

Posted by - May 10, 2021

Everyone is familiar with the uptick in email phishing scams that have come with the COVID-19 pandemic. Workers and employers alike are adapting their security practices to defend company and consumer data. However, cybercriminals are adapting too. One group is combining phone calls and custom phishing sites to corporate VPN credentials. This group acts on… Read more »

VoIP: Risk and Reward

Posted by - March 10, 2021

The ways that people communicate at work has evolved over the years, with online messaging services and email becoming more important. However, the office phone has remained a staple of office communication for decades. Recent advancements have changed what that phone system looks like. Voice over Internet Protocol (VoIP) phone systems have replaced traditional landlines… Read more »

Your Computer May Be ‘Fully Compromised’

Posted by - November 20, 2020

The world’s largest software registry, NPM, removed three packages from their site on Thursday after discovering that they contained malicious code.  Each of the packages were ‘libraries’ for the coding language JavaScript.  A library is a collection of resources often used for software development. Because libraries can contain so many different types of data, they… Read more »

The Hack is Coming From Inside the House!

Posted by - November 10, 2020

Sometimes it seems like it’s impossible to keep your business safe. Software is constantly improving. Cybercriminals are becoming more technologically savvy. The list of security to-do’s is growing ever longer. With all that happening, it can be hard to figure out where to start. One option is to hire someone to do the heavy lifting… Read more »