Social Media Scams Proliferate To TikTok

Money flipping cons have been popular approximately as long as money has existed.  They’ve been popular on Instagram and Twitter for years. Of course, it was only a matter of time before they got to TikTok, given how popular that social platform is becoming.  The latest scam promises to turn a few hundred dollars’ worth…

Read More

High Priority Vulnerabilities to Hackers

Free illustrations of Hacker

One of the most unfortunate parts of working with technology is the vulnerabilities that each new piece of software contains.  Developers release software containing millions of lines of code, then hackers inevitably search for loopholes within that complex code to crack a system. Once each loophole is discovered, developers issue patches to “fix” it.  However,…

Read More

Small Businesses Vulnerable To Attack

person in black long sleeve shirt using macbook pro

Did you ever think that your small business was only a small target for cyberattacks? Perhaps you believed that you didn’t have anything a hacker could possibly want? Or that you just flew under their radar because your business wasn’t very visible? Sorry, we have bad news. A new report by cybersecurity firm Barracuda Networks…

Read More

Internet Explorer’s End: What To Know

Free photos of Computer

As of June 15th, 2022, Microsoft has ended all support for Internet Explorer (IE). This marks the end of a nearly 20 year period in which IE was the main entry to the World Wide Web. IE ushered in the age of connection in 1995 and maintained possession of a majority of the browser market…

Read More

Microsoft Defender For Individuals

Free Close Up of a Keyboard Stock Photo

Microsoft often adds the business version of security apps to M365. However, the pandemic fundamentally changed the way we see the workplace.  The business environment shifted to a hybrid world, made up of multiple connected miniature offices within employee homes. Increases in outsourcing also contributed to massive change within company networks.  Freelancers now often work the…

Read More

Avoid Reply Chain Phishing Attacks

Phishing. Every remotely helpful article on cybersecurity these days mentions phishing. We keep harping on it because phishing remains the number one delivery vehicle for cyberattacks. A cybercriminal might want to steal employee login credentials. Hackers could wish to launch a ransomware attack for a payout. Scammers plot to plant spyware to steal sensitive info.…

Read More

What To Do About Lost Mobile Devices

Missing smartphones or laptops invoke instant panic. We all flinched just reading that sentence, after all. These devices run huge parts of our lives. Needed files, personal financial programs, daily apps, password managers, pictures, videos, social media and so much more. The information our mobile devices hold these days is more personal than what’s contained…

Read More

Improve Phishing Detection With SLAM

Free vector graphics of Hack

There are plenty of good reasons why phishing hovers at the top of the list for security awareness training. For the last couple of decades, it has remained the main delivery method for all types of criminal attacks. Ransomware, credential theft, database breaches, and more often launch via a phishing email someone fell for. Why…

Read More

How Often Do You Need to Train on Cybersecurity Awareness?

Free illustrations of Security

Once again, your annual phishing training runs well. Each training session teaches employees how to avoid phishing emails. Naturally, you’re feeling all good about it. Right up until about 5-6 months later, when your company pays for a costly ransomware infection. Sure enough, someone clicked on a phishing link. You think, what’s the use? You…

Read More

Home Security and IoT Devices

Free photos of Computer

We connect more and more devices to the internet in our homes every day.  The number has increased exponentially over the last ten years. Homes now typically have 10.37 devices connected to the internet. Mobile devices and PCs represent a little over half of those connected, and the rest are IoT devices. IoT stands for…

Read More