blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Having Computer Problems? Restart! (Don’t Shut Down)

Galen Winkler
Why is the first thing techs ask when you're having computer problems "have you tried restarting the computer?" The main reason I (and other IT professionals) do this, is because restarting forces the computer to discard everything in active memory and reload from scratch. Not only does this correct transient issues, but it gives us the closest thing to a “known good” as we're going to get — before getting into re-installing software, changing out hardware, or the like. We understand that it ...
Read More
Topics: Staff Training

10 Most Commonly Used Brands in Phishing Attacks

Alyssa Sisco
Phishing is a common tactic used by cyber criminals, as it can be very lucrative but doesn’t require as much technical, hacking know-how as other types of cyber attacks. Hackers often bank on you recognizing a brand name and being one-of-many that have an account with that company. With this in mind they convince you that the phishing email is legitimate. Often claiming that you’ve been locked out of your account, a payment didn’t go through, you need to update your information, or anything ...
Read More
Topics: Staff Training, Security Threats, Trends

Has my email address been spoofed?

Marco Ren
If you’ve ever experienced someone complaining about you sending them “nasty” emails that you never sent – you’re not alone. Some of you may even have received an email appearing to be from yourself, claiming that your PC has been hacked and demanding a ransom in the form of bitcoin. In these situations, your email account may have been compromised. However, if you contact your IT support team and they are certain that your email is secure and has not been hacked, there is another possibility – ...
Read More
Topics: Staff Training, Security Threats

10 tips for tightening the financial controls of your business

Alyssa Sisco
Recently, it has come to light that Save the Children Federation was swindled into wiring $1 million to cybercriminals. The money was allegedly going to buy solar panels for health centers in Pakistan, which is well within the scope of the organization’s standard operations. Unfortunately, the transaction was not uncovered as fraudulent until a month after it occurred, thus they were unable to stop the cybercriminals from making off with the funds.
Read More
Topics: Staff Training, Security Threats, Owners & Managers

7 lessons I learned from my smartphone password fiasco

Dianne Porr
Several years ago, I took part in the mass migration from flip phone to iPhone. I was excited but apprehensive, as I knew there was a lot to learn. At set-up I encountered my first hurdle - I didn't know where to start. My first mistake was asking a friend for help instead of going to support. My friend was more than happy to help, but when trying to create an Apple ID, the phone stated that my home email address was already taken and therefore, unavailable for me to use. Now, instead of ...
Read More
Topics: Staff Training

How to enable LastPass autofill on your phone (iOS & Android)

Alyssa Sisco
Once you start using LastPass, you don't want to stop using it. Yes, it's that helpful! The autofill feature makes it incredibly easy to log in to any account, while keeping your usernames and passwords secure. But did you know you can also use it on your phone? LastPass features allow you to not only log in to online accounts, but also log in to smartphone applications. Follow these steps to enable autofill on your Android and iOS devices.
Read More
Topics: Staff Training

How to identify Social Engineering

Alyssa Sisco
Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely. Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. ...
Read More
Topics: Staff Training, Security Threats, Network Security

Receive a free USB device? It may contain malware.

Alyssa Sisco
When an editor for The Economist (Leo Mirani), received a free mini USB-powered fan at the Singapore summit (where President Trump and North Korean leader Kim Jong-un met) he chose to not plug it in. He didn't know who made this fan, where exactly it came from, or if it had anything on it. However, he did know that any USB device presents the possibility of malware. Whether it's a fan, thumb-drive, mouse, keyboard (or anything else that plugs into your phone or laptop) it could pose a threat to ...
Read More
Topics: Staff Training, Security Threats

Are you an easy target for phishing scams?

Alyssa Sisco
The sole objective of any phishing email is to trick you into clicking it. If you aren't vigilant, it can be easy to fall for. It doesn't matter who you are, how much money you have, or what company you work for, you can be targeted and it's important to know how to protect yourself. Since Amazon and Uber are so well-known and widely-used, cybercriminals have often chosen them to impersonate. Their aim? To lull you into a false sense of security at seeing the familiar brand name. With the ...
Read More
Topics: Staff Training, Security Threats, Network Security

How many cybercriminals does it take to steal an identity?

Alyssa Sisco
Erase the stereotypical image of a lone, hooded man sitting in a dark room, stealing information to exploit for money. Cybercrime has become a well-oiled machine comprised of networks of organized tiers. In essence, an unethical service-based corporation, everyone has a specific job that contributes to the success of the business. Some cybercriminals are experts in hacking and stealing information, while others are good at turning that data into profit. Unfortunately for us, they have all found ...
Read More
Topics: Staff Training