Blog
Stay up to date in new trends in IT and cyber security. Have an interesting topic you'd like our thoughts on? Get in touch with us today!
Cybercriminals in Disguise: Are you a victim of Business Email Compromise (BEC)?
Business Email Compromise (BEC) is not a new term. What is it? BEC is when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person. Sometimes the email address varies from a legitimate email address by just a letter or two.
Read MoreWorking from home? It’s never too late to evaluate!
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in confidence.
Read MoreHovering (over links) is your best secret weapon!
Hidden text, also known as zero font, allows a malicious email to bypass email security platforms by using invisible characters in between the letters of an email. They are often used to establish the legitimacy of emails. Read on to find out how to protect yourself from falling victim.
Read MoreCybercriminals are Businesspeople too!
We don’t often think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the exposure of organizations that steal our information.
Read MoreSTOLEN: Laptop Worth $1M!
Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.
Read MoreNew Scam Targeting Medical Entities that Your SPAM Filter will NOT Stop!
It’s always nice to get a postcard from friends or family who are away on vacation. But this week we learned of a new kind of postcard being sent out with not-so-well wishes.
Read MoreIs Your Email Worth Millions?
A year of credit monitoring along with identity theft monitoring services. That’s what most of us settle for when we find out that our personal data has been compromised. We are alerted, we change our password, we read the letter that offers these services and may or may not sign up for them.
Some individuals will pursue additional legal action and proceed by taking the company that was responsible for the breach to court for monetary compensation, and some will not pay attention at all.
Read More