BLOG
Tax Season Brings Rise in IRS Scams
As the stress of the tax filing process ramps up so do the amount of IRS and tax related phishing scams. Here’s what to look out for, steps you can take to not be scammed, and what to do in case you become a victim of an IRS Tax scam.
DHL: The Most Imitated Brand in Phishing
The international shipping company, DHL, has quickly become the most targeted company for phishing scams over the past year accounting for roughly 23% of all phishing scams on a global scale.
Web Trackers Collect More Info Than Previously Believed
Researchers at Norton LifeLock have determined that web trackers are collecting much more information about users’ browsing activity than had previously been believed.
Top 10 Phishing Email Subjects: Q4 2021
Business phishing emails are the most clicked subject category across the world. These range from messages purporting to be from internal organizational departments, to external requests for information that convey a sense of urgency and entice users to take an action
2022: Securing the Year Ahead
Resolving to take simple steps to make you, your family, and your organizations more cyber secure will set you up for a successful 2022. Here are 5 cybersecurity resolutions we guarantee you can keep.
Can Macs Get Viruses?
There is a common misconception that Mac computers can’t get viruses. While it’s true that Apple created a highly secure operating system with macOS, it’s still entirely possible to get a virus on your Mac.
How To Safely Use Public WiFi
A public WiFi network is inherently less secure than your own, private one, because you don't know who set it up, or who else is connecting to it. Here are the do’s and don’ts of using public wifi to mitigate your hacking risk.
Food Supply Chain Ripe for Cybercrime
The US Department of Justice has warned the food and agriculture sector to watch out for ransomware attacks aiming to disrupt supply chains.
Massive T-Mobile Data Breach: Safeguard Your Data Now
Wireless carrier, T-Mobile, has confirmed reports of a major data breach in which hackers obtained personal information belonging to more than 54 million past, present and potential customers.
5 Common Cybersecurity Myths
With all of the information out there about hacking, cyber breaches, software, and security awareness, there’s also a number of myths and misconceptions preventing organizations from making the right calls when it comes to safeguarding their technology.