Seven Tips For Detecting A Phishing Email

Cyber criminals might send an email that looks legitimate, known as a phishing email, but you can take steps to avoid the traps! Watch For Overly Generic Content And Greetings Cyber criminals will send a large batch of emails. Look for examples like “Dear valued customer.” Examine The Entire From Email Address The first part of the email address may …

SharePoint graphic

Seamless Collaboration With Sharepoint

Whether working from home or in the office, collaborating with your team on a project can be challenging when a presentation or important document is emailed amongst team members for review and updates. This creates multiple versions of the same critical file and can result in confusion over which document is the most up-to-date and complete. SharePoint eliminates this workflow …

Zoom graphic

Staying Cyber Safe On Zoom

One of our top priorities is keeping you online, whether working from a traditional office, your new home office or anywhere in between. While Microsoft offers a plethora of remote collaboration tools, we recognize Zoom is an extremely popular alternative for online meetings and educational institutions. So, we wanted to take a few minutes to make sure you are using …

Coronavirus cybercrime

Hackers Are Capitalizing On Coronavirus

Cybercriminal activity is always evolving, and now hackers are banking on the novel coronavirus having potential victims distracted when clicking a link. Hackers are capitalizing on fears and the quest for information by creating malicious websites disguised as popular COVID-19 maps. When unsuspecting users click on the map, they are prompted to open an applet. This software infects the computer …

Old Drivers Could Cause WiFi Issues After Windows 10 Update

Does your computer contain a Qualcomm wireless network adapter?  If so, be aware that Microsoft is warning you that your system may suffer a sporadic loss of Wi-Fi connectivity after installing the Windows 10 update. The update was released in May 2019, stemming from an issue with out-of-date network drivers. If you haven’t yet installed the May 2019 update and …

Social Security Administration Seeing High Number Of Scams

The Federal Trade Commission (FTC) recently issued a public service announcement regarding the growing number of Social Security related scams they’ve been getting reports about. In 2017, just 3,200 people called to report instances of SSA Voice Phishing (called ‘vishing’), with total 2017 losses amounting to some $210,000. In 2018, that number swelled to more than 63,000 with losses in …

Lunch and Learn image

Employee Education Emphasized At Cyber Security Event

Educating employees as the first, and most vital, line of defense against cyber-attacks on your business was the dominant theme at our most recent Lunch & Learn. “I really enjoyed the presentations from the other two speakers and the excellent questions from the attendees,” Deana Pizzo said. “I was really struck by the fact that each of us stressed the …

New Amazon Order Confirmation Emails Could Be Phishing Attempts

According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide.  To say that it gets a lot of traffic every day would be an understatement, which is why a newly discovered phishing campaign pretending to come from Amazon is so disturbing. Although Amazon sees heavy traffic every day of the year, things …

Data On Millions Of Americans Leaked Through Open Server 

Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery.  He found an ElasticSearch server open and vulnerable on the internet, without so much as a password to protect it. Unfortunately, the server was leaking a staggering 73GB of data and had a number of databases cached inside the server’s memory.  In one of those …

You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.  However, that’s not …