blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Receive a free USB device? It may contain malware.

Alyssa Sisco
When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to ...
Read More
Topics: Staff Training, Security Threats

Are you an easy target for phishing scams?

Alyssa Sisco
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself. Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the ...
Read More
Topics: Staff Training, Security Threats, Network Security

The shift from ransomware to cryptomining

Alyssa Sisco
In its earliest days, ransomware wasn’t much of a threat, because it couldn’t actually encrypt data. But that was in the 80's and 90's, those days are long over in the field of technology. Within the past few years, not only has ransomware become a formidable threat but it has also grown exponentially. The world experienced a growth from 3.2 million ransomware attacks in 2014, to 3.8 million in 2015. Then, in 2016, ransomware attacks jumped to a staggering 638 million. Not only did the amount ...
Read More
Topics: Security Threats, Trends, Network Security

What can a computer hack really cost you?

Alyssa Sisco
Being the target of a cybercriminal is not a fun experience for anyone, but it’s definitely a lot worse if you don’t have a plan to get back on your feet afterwards. Cybercriminals have caught on to the fact that small and midsize businesses don’t spend as much money on IT security, making them easier targets than large, multimillion-dollar companies. It’s important to note that 62% off all cyber-attacks are carried out on SMBs, according to IBM. Additionally, the National Cyber Security ...
Read More
Topics: Security Threats, Data Breach, Network Security

Keeping up with the Spectre and Meltdown vulnerabilities

Alyssa Sisco
This year certainly started off with a bang in the world of tech security. It’s not very often that in this day and age, a processor flaw becomes a substantial headline for mainstream news outlets. But when it impacts basically every computer or smartphone made in the past 15 years and could negatively affect billions of tech users, that’s kind of a big deal. Essentially, in the drive to create faster technology, some design decisions were made that unknowingly left our devices vulnerable to ...
Read More
Topics: Security Threats, Network Security

Meltdown & Spectre FAQ

Chris Vilim
PDF: Spectre and Meltdown FAQs
Read More
Topics: Security Threats

Is your inbox a crime scene?

Alyssa Sisco
Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up ...
Read More
Topics: Staff Training, Security Threats

All I want for Christmas, is your identity

Alyssa Sisco
It’s the most wonderful time of the year. Not only for the good-hearted souls searching for the perfect gifts for their loved ones, but also self-serving cyber criminals. They spend their holiday season trying to lure you in with bogus discounts and counterfeit websites. They want you to believe that you finally found the perfect gift at a price you can afford, when really, you just unknowingly gave away your credit card information to be auctioned off on the dark web.   As you embark on your ...
Read More
Topics: Security Threats

7 password security tips to keep yourself safe

Emily Moulder
Passwords have the key to unlock access to our network of friends, work colleagues, and most importantly our bank accounts. It is imperative to keep our passwords private, diverse, and hard to crack. There are cybercriminals out there spending their days finding the codes to peoples digital accounts and gaining access to their most private information. While most of us think we know all there is about having a secure password, we are not only making it more complicated then it needs to be, but ...
Read More
Topics: Security Threats

How to avoid 'smishing,' the latest SMS scam

Emily Moulder
We often get spam messages that are both annoying and dangerous. Cybercriminals are using targets' mobile phones to break into accounts and steal personal information, in so-called 'smishing' attacks. The criminal sends them malicious text messages typically containing a link or a number to call back to in order to obtain private information though a fake but genuine looking message. When a user clicks on the link or calls the number provided in the SMS message, he falls prey to the scam. The ...
Read More
Topics: Security Threats