Business Email Compromise Attempts: How Will it Happen?

As we already discussed this month, Compromised Email Attacks (BEC) are on the rise and everyone is at risk of being a victim. It would be nice if these attacks were uniform although the attacks and the attackers come in all shapes and sizes. To better protect yourself against these types of attacks it is vital to educate yourself on the different methods these attackers are using to strike.

Read more

Compromised Emails: What are They? Are you a Target?

The global risk of compromised emails is on the rise and should be a concern of every business organization. Some industries are targeted more often, but if your business uses email, you need to be aware of the risk and what the threat entails. To understand the risk, we need first to understand what a compromised email is and how it occurs. These risks are real and have been the cause of great financial destruction for many companies.

Read more

Yubikey: Even More Security!

Yubikey by Yubiko was a hit at last week’s CES 2019. Fans of this multifactor authentication device were already singing its praises, but these praises multiplied when Yubiko announced it now is compatible with iPhones and will be available soon to all users. Yubiko is a relatively new company so many have not heard the incredible reputation it is developing in the world of data security so if you are one of these individuals, dial in now and continue reading! Large corporations like Google and Facebook, who have extreme needs to secure data are already on board with Yubiko and have seen great success with their security needs.

Read more

The Internet of Things: What is it and how does it impact you?

What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this. The devices that are now being connected include such things as cars, jet engines, coffee makers, refrigerators, heart monitors and soon, potentially anything with an on/off switch could potentially be connected.. According to Gartner, it is expected that there will be 20.4 billion devices connected by 2020.

Read more

Why Annoying Password Aren’t Really Annoying

 

Unless you have been living off the grid for the past year, you have heard of the massive increase in cybercrimes. One of the easiest ways for a hacker to get into your computer is by guessing your password. Think your password is secure? Are you aware that it takes less than 2 seconds to crack a simple 7-character password? Or that it takes only 13-hours to crack a simple 10-character password. But it takes a seasoned hacker over 10-centuries to hack a 12-character password that includes a space. So how do you keep your data as save as possible by creating a solid password?

Read more

What is a Port Scan and Why Should it Concern Me?

If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?

Read more

Smart They Are, But How Safe Are Smart Homes?

Smart Homes. What are they and are they safe?

Smart Homes are defined as,

“a residence that has appliances, lighting, heating, air conditioning, TVs, computers, entertainment audio & video systems, security, and camera systems that are capable of communicating with one another and can be controlled remotely by a time schedule, from any room in the home, as well as remotely from any location in the world by phone or internet.”
Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company