Security

How Cyber Criminals Can Bypass Your Reputation Management

As technology advances, cyber criminals develop new tactics to carry out new attacks. Real-time Blackhole List (RBL) was developed in 1997 and was the foundation of today’s DNS-based Blackhole List (DNSBL) format. But cyber criminals carry out attacks that undermine and bypass IP reputation management systems. Hence, it is important to for security professionals to evolve and stay ahead of...

Read More

Then and Now: Move Forward with Your IT Security Initiatives

Mobile devices are great tools that allow for enhanced mobility and convenience, but this increased accessibility is also a major detriment in terms of data security. Mobile devices are notorious for being considerable security threats to businesses that utilize them. Therefore, businesses that use mobile devices on a regular basis should absolutely be aware of how they can influence security...

Read More

The Unofficial Guide to Comprehensive Google Account Security

There is no denying that a Google account is a very valuable thing to have today, and if valuable doesn’t seem like the right word to use, let’s say practical. Business and casual users alike use the wide variety of services for many purposes - but are they doing so safely? Unfortunately, the answer that applies to far too many...

Read More

Basic Email Security Practices Everyone Should Know

Email is a great communication tool for just about every business in existence today, which makes it no surprise that many cybercriminals choose it to be their preferred attack vector. In order to keep your business as secure as it needs to be, there needs to be a respect for the importance of comprehensive security standards and practices. Let’s review...

Read More

Scammers Can Use Gift Cards to Target Your Company

Ready or not, the season of giving is here, and that means it’s gift card season. These can seem to be the perfect gift for coworkers and employees… which is why everyone will need to be wary of a particular business email compromise scam that has seen an uptick this year. Some Background Let’s face it - business owners, managers,...

Read More

How Your Kids Can be Hurt by Devices (and Vice Versa)

As technology advances and improves at an exponential rate, it is little wonder that today’s youth are growing up with a closer relationship to technology than any other generation before them. While this has opened up many beneficial opportunities for them, it can also be the source of many serious issues without the proper supervision. The hard truth is that...

Read More

A Short Look at 2018 in Cybersecurity

Hackers and other security threats are everyday problems for users all over the world. We’re not even talking about just simple phishing emails--you’d be surprised by how many victims are from straight-up hacking attacks. The security sector has been forced to adapt, growing at an astronomical rate. To help your organization get up to speed on the latest threats and...

Read More

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak. You should know, before we get into the scam that 30 percent...

Read More

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn. Nigelthorn’s Method of Attack The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this...

Read More

Your Network is at Threat from the Inside, Too

It’s no secret that a business’ security is one of its most important considerations. It would seem that there is a daily reminder of this unfortunate fact - but it’s even more unfortunate that many people aren’t aware of where many threats can actually come from. Below, we’ll discuss how some threats start on the inside - as well as...

Read More