BLOG

 

Tax Season Brings Rise in IRS Scams
Security Kotman Technology Security Kotman Technology

Tax Season Brings Rise in IRS Scams

As the stress of the tax filing process ramps up so do the amount of IRS and tax related phishing scams. Here’s what to look out for, steps you can take to not be scammed, and what to do in case you become a victim of an IRS Tax scam.

Read More
Top 10 Phishing Email Subjects: Q4 2021
Security Kotman Technology Security Kotman Technology

Top 10 Phishing Email Subjects: Q4 2021

Business phishing emails are the most clicked subject category across the world. These range from messages purporting to be from internal organizational departments, to external requests for information that convey a sense of urgency and entice users to take an action

Read More
2022: Securing the Year Ahead
Security Kotman Technology Security Kotman Technology

2022: Securing the Year Ahead

Resolving to take simple steps to make you, your family, and your organizations more cyber secure will set you up for a successful 2022. Here are 5 cybersecurity resolutions we guarantee you can keep.

Read More
Can Macs Get Viruses?
Security Kotman Technology Security Kotman Technology

Can Macs Get Viruses?

There is a common misconception that Mac computers can’t get viruses. While it’s true that Apple created a highly secure operating system with macOS, it’s still entirely possible to get a virus on your Mac.

Read More
How To Safely Use Public WiFi
Security Kotman Technology Security Kotman Technology

How To Safely Use Public WiFi

A public WiFi network is inherently less secure than your own, private one, because you don't know who set it up, or who else is connecting to it. Here are the do’s and don’ts of using public wifi to mitigate your hacking risk.

Read More
5 Common Cybersecurity Myths
Security, Strategy Kotman Technology Security, Strategy Kotman Technology

5 Common Cybersecurity Myths

With all of the information out there about hacking, cyber breaches, software, and security awareness, there’s also a number of myths and misconceptions preventing organizations from making the right calls when it comes to safeguarding their technology.

Read More