blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Is Your Inbox A Crime Scene? 6 Ways to Evaluate Potential Phishing Scams

Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. However, the instant you click, you open yourself up to malware attacks that can cost you financially and reputationally, and it will definitely eat up time to reverse the ...
Read More
Topics: Staff Training, Security Threats

How To Catch A Cyber Criminal

Cyber criminals attack, on average, every 39 seconds, and 43% of cyber security attacks target small and midsized businesses. They snatch data or compromise records, hack into unsecured computer systems, pilfer money, and steal identities. They use phishing, malware, ransomware, social engineering, and numerous other tactics to obtain data and other resources. But surely not all of these cyber criminals can get away with their crimes, right? Read on to find out how cyber criminals are caught - ...
Read More
Topics: Security Threats

Why are Cyber Criminals More Likely to Target Small to Midsize Businesses?

(Updated March 09, 2023)
Read More
Topics: Security Threats, Data Breach

Dark Web, Deep Web -- What's the difference?

So how many of you watched the series CSI: Cyber before it was cancelled? Like many other detective dramas, they often talked about the “DARK WEB” (dramatic music playing in background). Sounds scary, right?? Then they throw in the term “Deep Web” to really confuse us. Although I have begun to grasp the idea of what the Dark Web is, there is still a bit of mystery to it. What I do know is that when my data was stolen from a large insurance firm I was told that my personal information was being ...
Read More
Topics: Staff Training, Security Threats

BEC fraud: The threat you can't afford to ignore

Business E-mail Compromise (BEC), commonly known as “CEO fraud,” is a rapidly increasing concern affecting companies’ financial and data security today. What exactly is BEC? It has been defined as a scam that targets businesses working with foreign suppliers and/or businesses that regularly use wire transfer payments. Scammers skillfully gain access to and impersonate company executives, attorneys, or suppliers through e-mails to fraudulently authorize the transfer of company funds. Payments ...
Read More
Topics: Staff Training, Security Threats, Data Breach