blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco

Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to ...

Read More
Topics: Staff Training, Security Threats, Trends

Antivirus vs. Firewall: Why Your Business Needs Both

Tom Montgomery

We have so much information at our fingertips, providing endless opportunities, but with that good, comes a continuous stream of cyber threats. Considering the pervasive presence of cyber criminals today, you need a line of security that’s as tough as anything they can throw at you.

You probably already know about the need for antivirus software — but is it strong enough to stand on its own? What about reducing the viruses and malware that make their ...

Read More
Topics: Security Threats

How much information is on your IoT devices?

Joel Havenridge

You wouldn’t throw your financial paperwork in the trash without shredding it - or at least, you shouldn’t. Because you know that if someone got a hold of that information, they could potentially steal your money. But what about your IoT devices? Are you as careful when disposing of them? How much information is on smart devices you’ve connected in your home? When it comes time to get rid of them, there may be enough information left on them to open ...

Read More
Topics: Security Threats, Network Security

Why your small business should care about malware

Alyssa Sisco

Talking about the dangers associated with a malware infection can feel abstract for those who have never experienced it firsthand. To some, it may seem like a vague concept, not something that really requires you to take action. Most small business owners feel that it’s not going to happen to them and they have more pressing matters to attend to. However, they don’t usually realize that 47% of small businesses experienced at least one cyber attack in 2018 and ...

Read More
Topics: Security Threats, Owners & Managers

Has my email address been spoofed?

Marco Ren

If you’ve ever experienced someone complaining about you sending them “nasty” emails that you never sent – you’re not alone. Some of you may even have received an email appearing to be from yourself, claiming that your PC has been hacked and demanding a ransom in the form of bitcoin. In these situations, your email account may have been compromised. However, if you contact your IT support team and they are certain that your email is secure and has not been ...

Read More
Topics: Staff Training, Security Threats

Do external devices have access to your business's internal network?

Alyssa Sisco

Any infected device that is connected to your internal network has the potential to infect all the other devices on that network. Last week, a third-party vendor brought in a device that when connected to CHI Health’s network, introduced malware to their system. The virus spread to different devices at some of their hospitals and clinics and affected browsers attempting to connect with the health system’s network.

Read More
Topics: Security Threats, Network Security

Do you know if your CEO’s email username and password are being sold on the dark web right now?

Alyssa Sisco

Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you ...

Read More
Topics: Security Threats, Data Breach, Network Security

10 tips for tightening the financial controls of your business

Alyssa Sisco

Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the ...

Read More
Topics: Staff Training, Security Threats, Owners & Managers

The risks of unpatched applications and unsupported equipment

Alyssa Sisco

Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, ...

Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's ...

Read More
Topics: Staff Training, Security Threats, Network Security