A credential stuffing attack brought the popular genetic research company 23andMe to a crisis point last week, and its attacker is now offering to sell the names, locations, and ethnicities of millions of users. Credential stuffing is what happens when subscribers repeat the same username-password combinations on multiple websites, and …
Move Away From A File Server And Into The Cloud!
Think SharePoint is just like your traditional file server? Thank again. SharePoint is SO much more than just a file server! How does SharePoint Online differ from a traditional file server? File servers are designed for centralized data storage and management. In the past, this was the only way to …
Security-Savvy Employees Are Critical For Cyber Resilience
In chess, two rows of pieces are placed on either side of the board. These rows consist of eight pawns as the first line of defense against the enemy. The rest of the pieces behind them can move about effectively, depending on how you direct your pawns. But what if …
Phishing Awareness Tips To Help Stop Cyberattacks
Coming into contact with phishing scams has become a common occurrence for businesses. The combination of low upfront costs and a high success rate keeps phishing popular. Bad actors rely on phishing as a precursor to many dangerous attacks, such as ransomware, account takeover and business email compromise (BEC). In …
I.T.S. Ranked on Prestigious Worldwide List of Managed Service Providers
Hypoluxo, FL, June, 2023 – I.T. Solutions of South Florida was recently named as one of the world’s premier managed service providers in the prestigious 2023 Channel Futures MSP 501 rankings. “We are honored to once again be recognized by Channel Futures for our technical talent, growth-oriented business models and …
Six Preventive Measures To Thwart Email-based Cyberattacks
Did you know that 9 in 10 cyberattacks start with a phishing email? Email is the most likely vector for employees to come into contact with a cyber threat, and every business is inundated with email daily. It’s critical that businesses do everything that they can to reduce their risk …
FBI and FCC Cautions On Juice Jacking
The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) are warning the public about the dangers of “juice jacking.” Juice jacking occurs when someone innocently plugs their phone or mobile device into a compromised USB port that is infected with malicious software. Such malware can allow criminals …
4 Dark Web Threats Businesses Need to Watch
The dark web is constantly evolving to present a thorny ticket of hazards for businesses. The point of origin for many of today’s most nasty and damaging cyberattacks, the dark web is the world’s third-largest economy and unlike many of the world’s industries, constantly growing. Dark web threats Cybersecurity Ventures …
GPT-3 Makes Phishing Scams Like These Worse
Phishing attacks have reached a new high, with cybercriminals favoring various phishing techniques to trap their victims in nasty phishing scams. Hackers use different phishing techniques as a precursor to many devastating cyberattacks like ransomware, business email compromise (BEC), malware and account takeover. As perpetrators use deceiving social engineering lures, …
Malicious Insiders Damage Their Employer Fast
Malicious insider risk is an unpleasant but ongoing situation that every business has to deal with daily. Both current and former employees can intentionally damage a company, and just one disgruntled employee can wreak havoc fast However it happens, malicious insider actions are responsible for an estimated 25% of confirmed …