BLOG
What's That Term?: Ransomware
Ransomware is an ever-evolving form of malware designed to hold a victim’s data for ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.
New Phishing Attacks Bypass Secure Email Gateways
An ongoing phishing operation that has stolen around 400,000 OWA and Office 365 credentials since December has now expanded to exploit new legitimate services in order to bypass secure email gateways (SEGs).
Top-Clicked Phishing Email Subjects: Q1 2021
Emails purporting to come from HR and security-related notifications are on the rise as employees return to the office.
Got Certs? Our Team Does.
Check out our team members that received new technology certifications this quarter. These certifications not only mean that these people are wicked smart, but also that our clients are being supported by the best in the game.
How Your Supply Chain Can Impact Cybersecurity
Your supply chain can create a number of vulnerabilities in your network, so it’s important to not only focus on your own cybersecurity efforts, but to also be aware of the organizations you partner with and their security practices.
Two-Factor Authentication Isn't as Secure as You Think
Two-factor authentication raises the barrier to account access by requiring a secondary proof of identity, but it still has a number of weaknesses that can be exploited by cybercriminals.
Beware the W2 Phishing Scam
For the past several years, thousands of businesses have been hit with phishing scams during tax season - and this year is unlikely to be any different.
Meet Chris Palomares (Video)
Get to know Technical Support Specialist, Chris Palomares. Chris tells us all about how he got started in IT, what he likes to do on the weekends, and his greatest personal achievement so far.
What's That Term?: Cookies
A cookie is a small text file created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk. Cookies provide a way for the website to recognize you and keep track of your preferences.
Think Your Business is Too Small to be Hacked? Think again.
As a managed IT services provider, it’s common for us to hear from business owners that they’re not really concerned about cybersecurity because they’re too small for hackers to target. But the truth is, any business can be a target for a cyberattack, regardless of their size or revenue.