Protecting Your Business: Unmasking the Most Common Scam Calls

Posted by - February 20, 2024

Following the recent viral story of the woman who lost $50,000 to a phone scam, the discourse surrounding scam prevention has been renewed. Unfortunately, stories like these are becoming increasingly common and are not only detrimental to individuals – but can be to businesses as well. Below are five of the most common scam calls… Read more »

Are Longer Passwords Safer Against Cyber Attacks?

Posted by - February 05, 2024

A 16-character password may be just as susceptible to a hacking attempt as a short password, according to a recent Specops Software report. Using easily guessable, duplicate, and simple passwords may make it easier for you to remember, but it also makes it easier for hackers to hijack your accounts. With a booming market for… Read more »

Microsoft’s Response to Midnight Blizzard Data Breach

Posted by - February 02, 2024

Immediate Response and Detection On Friday Microsoft released an official statement on its actions following a cyber breach by Nation State Actor Midnight Blizzard against its corporate systems. This breach raises concerns about the ongoing threat from nation-state actors and highlights potential shortcomings in Microsoft’s cyber practices. Common issues such as poor password management and… Read more »

Can Hackers Still Bypass 2FA?

Posted by - January 10, 2024

Despite having 2FA enabled, Mandiant, a Google-owned company, was recently the victim of a cyber-attack against their Twitter account with over 100,000 followers. To appear more legitimate, the hackers renamed the account “Phantom” and updated the bio to pose as the Phantom Cryptocurrency wallet. The hackers then used the account to promote links to a… Read more »

Ransomware: Why You Shouldn’t Pay to Get Data Back

Posted by - December 28, 2020

Ransomware attacks have been on the rise for years.  The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses.  These scams take several forms.  The group could lock… Read more »

Huge Increase in Ransomware Attacks as Criminals Focus on Targeting Businesses

Posted by - September 15, 2020

A report released shows an extreme increase of ransomware attacks over the course of 2020. Ransomware attacks have been on the rise and getting more dangerous in recent years, with cyber criminals aiming to encrypt as much corporate networks as possible to extort bitcoin ransom from companies before returning their data. A single attack itself can result… Read more »

Twitter Speculates on How Thousands of High Profile Accounts were Hacked

Posted by - August 04, 2020

Twitter has finally released information on the hack it suffered earlier in July where high profile accounts were breached, and hijacked to post cryptocurrency scams. Victims of the attack, which was perpetrated by hackers with access to Twitter’s internal account management support tools, included Amazon’s Jeff Bezos, Elon Musk, Bill Gates, Joe Biden, Barack Obama, and Kanye… Read more »

OptfinITy Ranked Among World’s Most Elite 501

Posted by - July 30, 2020

OptfinITy Ranked Among World’s Most Elite 501 Managed Service Providers Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services JULY 28, 2020: OptfinITy has been named as one of the world’s premier managed service providers on the prestigious 2020 annual Channel Futures MSP 501 rankings. For the 13th year running,… Read more »

Chinese Malware Found Inside Required Business Software

Posted by - July 17, 2020

Three weeks ago, security researchers detected and exposed a piece of malware lurking inside of tax software that the Chinese government requires companies to install. The evidence gathered reveals that the spy campaign showed that a separate piece of malware released equally sophisticated ways to infect the taxpayers in China. GoldenHelper, which is the name… Read more »