Blog
Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!
STOLEN: Laptop Worth $1M!
Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.
Read MoreNew Scam Targeting Medical Entities that Your SPAM Filter will NOT Stop!
It’s always nice to get a postcard from friends or family who are away on vacation. But this week we learned of a new kind of postcard being sent out with not-so-well wishes.
Read MoreIs Your Email Worth Millions?
A year of credit monitoring along with identity theft monitoring services. That’s what most of us settle for when we find out that our personal data has been compromised. We are alerted, we change our password, we read the letter that offers these services and may or may not sign up for them.
Some individuals will pursue additional legal action and proceed by taking the company that was responsible for the breach to court for monetary compensation, and some will not pay attention at all.
Read MoreMask Mandate: Does It Violate HIPAA?
Whatever your opinion is of wearing, or not wearing a mask, there are an increasing number of mandates being put in place by governments or independent establishments in an effort to mitigate the spread of COVID-19. This mask mandate means that most people over a certain age need to have their face covered, including their nose and mouth.
Read MoreWhat is Spoofing?
Spoofing is a cybercriminal’s malicious misrepresentation of a phone number, website, or email. By masking their true identity, a cybercriminal is more likely to pull off their scam.
Read MoreHow Do You Protect Your Company from Employee Errors?
We all know (or should know) that human error accounts for the majority of breaches. Phishing gives hackers entry to a business’s front door by manipulating the employees who work there.
Read MoreWhat are Keyloggers?
A keylogger is a tool designed to silently spy and record our daily activities on a device. Once a keylogger is installed, it can feed information directly to a cybercriminal in real-time.
Read More