Protecting Your Business: Unmasking the Most Common Scam Calls

Posted by - February 20, 2024

Following the recent viral story of the woman who lost $50,000 to a phone scam, the discourse surrounding scam prevention has been renewed. Unfortunately, stories like these are becoming increasingly common and are not only detrimental to individuals – but can be to businesses as well. Below are five of the most common scam calls… Read more »

OnlyFake: The $15 Threat Lurking in the Shadows of AI

Posted by - February 15, 2024

A new AI-powered platform named OnlyFake is generating fake IDs for as low as $15, sparking concerns about potential misuse for criminal activities. OnlyFake’s owner claims these realistic IDs can be created in mere minutes and successfully pass KYC checks at major crypto exchanges. If placed in the wrong hands, this technology could be used… Read more »

Use of Blockchain Poses New Cybersecurity Risks

Posted by - December 14, 2023

Blockchain technology is most commonly associated with cryptocurrencies, but it has many potential applications for cybersecurity. Blockchain is a decentralized ledger that records transactions securely and transparently. This makes it ideal for storing sensitive data such as financial records or personally identifiable information. However, the use of blockchain also poses new cybersecurity risks. For example,… Read more »

How Texas Snowstorms Impact Tech Companies Worldwide

Posted by - May 30, 2021

It’s been a cold month in Texas–an Arctic front covered most of the middle and southern American states in snow.  Some parts of the southernmost state received over a foot of icy accumulation, and temperatures fell to single digits.  While areas of the US can handle those conditions, Texas’s infrastructure was drastically unsuited to the… Read more »

Combo Phishing Attacks Target VPN

Posted by - May 10, 2021

Everyone is familiar with the uptick in email phishing scams that have come with the COVID-19 pandemic. Workers and employers alike are adapting their security practices to defend company and consumer data. However, cybercriminals are adapting too. One group is combining phone calls and custom phishing sites to corporate VPN credentials. This group acts on… Read more »

Your Security Toolkit: Password Manager

Posted by - April 20, 2021

With work-from-home becoming the new normal, companies are scrambling to adapt their security practices.  Some are hiring an outside firm to handle their transition, while others are trying to cobble together an in-house solution.  Security is difficult to maintain at the best of times, and 2020 is most definitely not the best of times.  Security… Read more »

Does Remote Work Impact Security?

Posted by - March 30, 2021

Remote work has become a way of life for so many of us. It makes a lot of things harder. Communication, focus, and task management have all become more difficult. One of the things hardest hit by remote work is our online security. An overall increase in teleworking makes it harder for companies and workers… Read more »

Ransomware: Why You Shouldn’t Pay to Get Data Back

Posted by - December 28, 2020

Ransomware attacks have been on the rise for years.  The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses.  These scams take several forms.  The group could lock… Read more »

TA542: It’s Spear-Phishing Season Again.

Posted by - December 10, 2020

When people think of spam emails, it’s usually phishing that comes to mind. These are the emails that make up your junk folder: a truly frightening combination of poor grammar, bad spelling, and vulgarity that makes you question how anyone can fall for a phishing attack. Spear-phishing has become the new way to create a… Read more »

Is Zoom Back in Business?

Posted by - November 30, 2020

Work-from-home is the reality for so many of us during the coronavirus pandemic. Being out of the office has its challenges: interrupting kids, spotty internet, and endless miscommunications! However, online meetings have become the symbol of this new working environment, especially the virtual meeting app ‘Zoom’. Part of the app’s popularity was its security. Zoom… Read more »