Tag Search: phishing

Microsoft Word bug: What you need to know

Posted on Wednesday April 26, 2017  |  word, security training, security, phishing, office, microsoft, malware, dridex

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.

 

The phishing craze that’s blindsiding users

Posted on Monday April 24, 2017  |  phishing, malware, homographs, cybersecurity, browsers

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice for how to avoid the newest trend in phishing.

 

Social engineering and cyber security

Posted on Friday October 07, 2016  |  social engineering, security, phishing, cybersecurity

2016october7_security_aSocial engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.

 

9 essential cybersecurity phrases

Posted on Wednesday September 21, 2016  |  zero day attack, security, ransomware, phishing, patch, malware, cyber attackers

2016september21_security_aAs with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you're looking for a list of the industry's most relevant terms, you've come to the right place.

 

4 Social engineering scams to watch out for

Posted on Thursday August 18, 2016  |  tailgating, social engineering, scams, rio olympics, quid pro quo, pretexting, phishing

2016August18_Security_AEvery time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. But spectators aren't the only victims. Without knowing the most common social engineering exploits, your business's data is also at risk. That's why we have compiled four of the most frequently used social engineering scams to help protect you and your business.

 

Google Tests New Login Option

Posted on Tuesday January 05, 2016  |  trends, tech, smartphones, security, phishing, passwords, google

Smart phone with color apps flying out.It seems Google is taking the issue of online security increasingly serious as they have recently unveiled their latest attempt to stem the tide of phishing. Trialing a password-free login option, they also aim to curb the dangers caused by ineffective and over simplified passwords - something that every small and medium sized business needs to be paying attention to. In simple terms, the function uses your smartphone to log in to your Google account - so how will it work?

 

Page:   12345678

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016