Tag Search: social engineering

A short guide to IT security lingo

Posted on Friday July 29, 2022  |  malware, it security, computer security, ransomware, antivirus, phishing, cybersecurity, social engineering, zero day attack, intrusion prevention system

As more and more businesses move their operations online, the need for robust cybersecurity measures has never been greater. However, many employees are still unfamiliar with many cybersecurity terms. Here are some of the most commonly used terms in IT security. By understanding these terms, you will be better equipped to protect your business from cyberattacks.

 

Don't let hackers fool you with these tricks

Posted on Tuesday September 25, 2018  |  tailgating, social engineering, scams, rio olympics, quid pro quo, pretexting, phishing

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren't immune to the hackers' favorite strategy - social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here's what you should know to protect your business.

 

Young workers are more gullible to tech scams

Posted on Thursday November 10, 2016  |  social engineering, phone scams, cybersecurity

2016november10_security_aThe old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they're taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists are targeting the younger generation -- and succeeding.

 

Social engineering and cyber security

Posted on Friday October 07, 2016  |  social engineering, security, phishing, cybersecurity

2016october7_security_aSocial engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.

 

4 Social engineering scams to watch out for

Posted on Thursday August 18, 2016  |  tailgating, social engineering, scams, rio olympics, quid pro quo, pretexting, phishing

2016August18_Security_AEvery time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. But spectators aren't the only victims. Without knowing the most common social engineering exploits, your business's data is also at risk. That's why we have compiled four of the most frequently used social engineering scams to help protect you and your business.

 

IT security predictions for 2016

Posted on Monday December 28, 2015  |  vulnerability assessment, social engineering, network assessment, it security, hacking, cyber security

Security_Dec24_AOnline security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year�s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts predict that this year will only see cyber crime increasing yet further. Here�s what you need to know.

 

Page:   1

Celebrating 30 Years

Managed Computer Support Services

Contact Us