blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

The risks of unpatched applications and unsupported equipment

Alyssa Sisco
Everyday more technology processes are automated, saving us from performing tedious tasks over and over. However, the technology that helps us and makes our lives easier is also used by hackers and cybercriminals to take advantage of us. Hackers use automation to build bots that continuously search the internet for unpatched and vulnerable devices to infect. In fact, almost 30% of all internet traffic is made up of bad bots such as hacking tools, impersonators, scrapers and spammers. Once a ...
Read More
Topics: Security Threats, Data Breach, Equipment Purchases, Network Security

How to identify Social Engineering

Alyssa Sisco
Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely. Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. ...
Read More
Topics: Staff Training, Security Threats, Network Security

Voicemail hackers - a phone system security risk

Jason Hahn
Recently, we’ve noticed a large upswing in people hacking into voicemail systems. These hackers build mailboxes that allow the caller to dial international calls through the system. When they call and select the fraudulent mailbox they have built, the voicemail gives the hacker open access to the victim’s outside lines and they can make long distance and international calls at the cost of the victim. This can add up to thousands of dollars before it's even discovered. With so many security ...
Read More
Topics: Security Threats, Phone Systems

Receive a free USB device? It may contain malware.

Alyssa Sisco
When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to ...
Read More
Topics: Staff Training, Security Threats

Are you an easy target for phishing scams?

Alyssa Sisco
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself. Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the ...
Read More
Topics: Staff Training, Security Threats, Network Security

The shift from ransomware to cryptomining

Alyssa Sisco
In its earliest days, ransomware wasn’t much of a threat, because it couldn’t actually encrypt data. But that was in the 80's and 90's, those days are long over in the field of technology. Within the past few years, not only has ransomware become a formidable threat but it has also grown exponentially. The world experienced a growth from 3.2 million ransomware attacks in 2014, to 3.8 million in 2015. Then, in 2016, ransomware attacks jumped to a staggering 638 million. Not only did the amount ...
Read More
Topics: Security Threats, Trends, Network Security

What can a computer hack really cost you?

Alyssa Sisco
Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security ...
Read More
Topics: Security Threats, Data Breach, Network Security

Keeping up with the Spectre and Meltdown vulnerabilities

Alyssa Sisco
This year certainly started off with a bang in the world of tech security. It’s not very often that in this day and age, a processor flaw becomes a substantial headline for mainstream news outlets. But when it impacts basically every computer or smartphone made in the past 15 years and could negatively affect billions of tech users, that’s kind of a big deal. Essentially, in the drive to create faster technology, some design decisions were made that unknowingly left our devices vulnerable to ...
Read More
Topics: Security Threats, Network Security

Meltdown & Spectre FAQ

Chris Vilim
PDF: Spectre and Meltdown FAQs
Read More
Topics: Security Threats

Is your inbox a crime scene?

Alyssa Sisco
Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up ...
Read More
Topics: Staff Training, Security Threats