blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Is Your Phone Saying You have “Weak Security? Here’s What it Means.

Kaitlin Schneider
Has your mobile device alerted you to “weak security” recently?  The latest update patches from Apple and Android will now show an alert for weak security if your router or modem is using an outdated network security key. 
Read More
Topics: Security Threats, Alert

What Can We Learn From the New Executive Order on Cyber Security?

Chris Vilim
SolarWinds, the Microsoft Exchange Server hack, and now the Colonial Pipeline ransomware attack, among scores of other cyber security attacks and breaches, have led to President Joe Biden passing an executive order (EO) on cyber security.   This executive order, while not asking anything revolutionary, is a step in the right direction for our federal government, and many SMBs should take note of the items emphasized to better protect their own data and IT systems from the increasingly complex ...
Read More
Topics: Security Threats, Data Breach, Network Security

3 Types of Insider Threats and How to Prevent them in Your Organization

Kaitlin Schneider
When you hear the term “insider threat,” what comes to mind? Is it an irritated individual intentionally causing problems within your systems—perhaps one employee with a vendetta against your company?  Or is it something else entirely?  
Read More
Topics: Security Threats

How to Avoid Being Socially Engineered

Kaitlin Schneider
Social engineering attacks are increasing in inboxes everywhere, and it’s vital that your employees know how to spot these manipulation attempts.   In fact, according to an expert panel from Digital Guardian, only 3 percent of attackers try to exploit technical components and devices.   What about the other 97 percent?  
Read More
Topics: Security Threats, Network Security

4 Email Security Best Practices

Ryan Aiken
Email is one of the most important tools used for business communication. Because of that, it is also one of the most common causes of a security breach. With that said, there are several methods and services available to protect yourself from being exploited by a hacker. What practices should you follow? This article will explain 4 of the best practices for email security.
Read More
Topics: Security Threats, Network Security

Basic IT Security Policy Recommendations

Wynn Obermeyer
In this golden age of technology, companies can run a completely virtual business without ever opening a physical store. However, online businesses come with vulnerabilities and risks that can threaten your company’s security and livelihood. All businesses, small and large, are at risk for security breaches every day. Threats like ransomware and phishing can lead to detrimental damages to a company.  In fact, within six months of a cyber attack, 60 percent of small and midsize businesses (SMBs) ...
Read More
Topics: Security Threats, Network Security, Technology Planning

Top 5 Cyber Security Threats for Real Estate Companies

Kaitlin Schneider
Having recently purchased a house with my fiancé, I have witnessed firsthand how complex and involved the real estate process can get, as well as how many potential cyber security risks arise during a real estate transaction. Whether your real estate company sells residential or commercial properties, security of your contacts and data is critical. 
Read More
Topics: Security Threats, Network Security

What You Need to Know About the Dark Web, Deep Web, and Surface Web

Kaitlin Schneider
Every organization conducts business online, but you may not realize that the Web is much larger and more complex than most of us are aware of. In fact, the portion of the web that you use for day-to-day activity is just the tip of the iceberg.   There’s also the deep web, and the malevolent-sounding dark web.   It’s important to understand the differences among the surface web, the deep web and the dark web, as well as what you can do to protect your information from ending up for sale on the ...
Read More
Topics: Security Threats, Network Security

AI-Designed Deepfakes Present New Terrain for Cyber Threat Landscape

Kaitlin Schneider
Since they started showing up online in 2017, deepfakes have been sprouting up with more frequency.  While many of the examples that you see on YouTube and TikTok are uncanny and entertaining manipulations of face-swapped celebrities dubbed with each other’s voices, the eerie technology behind the phenomenon has the potential for serious cyber security risks for SMBs.  In one 2019 instance, an energy company in the United Kingdom was scammed out of $243,000, an amount one employee thought he ...
Read More
Topics: Security Threats, Trends

Identifying TrickBot Hinges on Your Ability to Recognize Phishing Emails

Angela Wight
The first step towards protecting yourself and your business is awareness. What types of scams are circulating? What are hackers pushing out and seeing results on? What tricks should I be watching out for?  One particularly "tricky" cyber threat, TrickBot, has evolved and taken different forms over the years. It’s even been crippled by Microsoft, who shut down its servers in October 2020.  However, TrickBot is back, and it’s something you need to be able to recognize. 
Read More
Topics: Security Threats