What is Spear Phishing?

While phishing attacks get the most press, spear phishing attacks can be much more dangerous. A phishing email has no intended target and is designed to barrage thousands of endpoints, hoping to get a bite. Spear phishing on the other hand, generally takes a targeted and thoroughly researched approach to...

Credit Card Skimming

Credit and debit cards are a simple and convenient alternate payment technique in lieu of cash. But, with so much of our financial information residing on these cards, they can be a major liability, if they fall into the wrong hands. Credit card skimmers have been around for years and...

Changing Our Attitudes About Password Security

Most situations teach us lessons so that we don't repeat damaging behaviors. For example, if you touch a hot stove, you know to pause and make sure it's off before doing it again. If you run out of gas on a highway, on future drives, you'll be on the lookout...

Mobile Threats (And How to Avoid Them)

Smartphones and tablets allow us to work from almost any location and improve our quality of life. However, the use of these mobile devices can present significant security challenges from both a personal and professional standpoint. Here are five common threats to watch out for and how to avoid them:...

Cybersecurity in a Changing Work Environment

Things have been pretty crazy these last few months. By no means are we back to normalcy or out of the woods, but there are signs of progress. Regardless of where the next few months or years takes us, there is a clear indication that the landscape of many working...

10 Tips to Help Protect Your Organization from Ransomware

Ransomware wreaked havoc among individuals and organizations over the past few years, making a name for itself across the globe. Although the chatter around the malicious software may have quieted down, the threat is very much alive, and working hard to hand out ultimatums to its victims - pay up...

What is Two-Factor Authentication (2FA)?

When it comes to cybersecurity, the terms and acronyms thrown around by professionals can seem confusing, making the entire concept of security a daunting one to understand. Two-factor authentication, or 2FA, can be one of those terms. Simply put, it is the process of using not one method of securing...

What are IoT devices?

"IoT" is a relatively new term, one that many of us may be unfamiliar with. However, there is a good chance that you're using at least one IoT device on a daily basis! The simplest definition of an IoT (Internet of Things) device is any object that can connect to...

Work From Home Tools

During the second week of March 2020, Next Century Technologies shifted its workforce to work-from-home status and put a halt to almost all on-site visits. Staying productive and communicating well while at home is quite the challenge. We leveraged our existing technology to make this happen but still ran into...

What is incident response?

What are the steps of an incident response plan? While every organization may have different structures and terminology, generic steps of most plans include: Preparation - compile a list of assets, and identify risks to those assets.Detection - discover and analyze the security incident.Containment, Eradication, and Recovery - contain the...

Windows 7 End of Life Creates New Opportunities for Scammers

They say when one door closes another one opens, but in this case, it's a window. On January 14th, 2020, Microsoft ended its support for Windows 7. Since Microsoft is no longer offering patches or security updates for vulnerabilities identified in Windows 7, hackers have a new way of gaining...

What is a VPN?

Most of us try to keep our personal information and work information safe and private. Makes sense! Nobody wants a stranger peeping over their shoulder watching what sites they access and what data they are entering. Unfortunately, being on an unsecured internet connection, that scenario is a realistic probability. VPN...