Be Cyber Aware: If You Connect It, Protect It
In today’s age, we all must be cyber aware. The average American today has access to more than 10 Internet Connected Devices in their household. Most have at least 2 computers and 2 smartphones. Across the world, an estimated 30 billion+ devices connect to the …
Is your Virtual Office Secure?
Many companies have found themselves forcing employees to work from home throughout the pandemic and now as we navigate hybrid learning environments. This trend has been a long time coming, but it seems like we’ve progressed more in the last six months than the previous …
Cyber Extortion: Don’t Be a Victim
We’ve all seen movies where a couple of thugs in trench coats walk into a store, take a look around and say something like, “Nice place you got here, shame if something were to happen to it.” Many people might think the days of extortion …
Cybersecurity for Small Businesses
If you own or run a small business you know, better than anyone, that it’s not easy work. It takes a lot of time and energy to meet the demands expected of you every week. That’s why certain aspects of running a business, such as …
Hackers are After Healthcare Information
When you think of a hacker frantically tapping away in a dark room, who do you think he’s targeting? Banks? The government? Try healthcare information. 2018 saw three times as many healthcare-related cyberattacks as the year prior, and 2019 is holding onto that momentum. Healthcare …
Rise of Ransomware
From a technology standpoint, there’s never been a better time to be alive. Chatting with people for free all across the world or opening your front door at home while in a business meeting, it seems that our interconnected world has unlimited possibilities. Sadly, that …
3 Ways Cybercriminals Use Social Engineering to Steal Your Info
Cybercriminals use social engineering every day to attempt to hack into people’s personal information. Social engineering preys on the human condition to gain trust, manipulate people and get people to willingly give out personal information. In general, there are three major ways that cybercriminals use …
Why are you so popular?
You’ve heard about many of the scams that exist on the internet now. It’s tough to simply look at your emails without noticing several phishing emails sitting in your inbox. Lately, the largest influx of social engineering scams has come from social media. As of …
Breaking Down Social Engineering
Most people are aware of terms like phishing and malware, but did you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud. In fact, it’s been used for many years to manipulate a wide …
Social Media Use Policy
Everywhere you turn today you will find social media. People taking selfies at the grocery store, responding to Instagram while walking down the street, and of course checking Facebook status while clocked in at work. What do you do when social media use gets out …