Phew! Hackers are Hard at Work! Just in the past few days, it has been revealed that Discord.io has been hacked, and the data of 760,000 users was put up for sale on the darknet. Not only that, hackers have leaked personal identifiable information (PII) data and photos of patients from a Brazilian plastic surgery …
Category Archives: Cyber Education
Gone Phishing
Phishing Attacks are Very Common A surefire way to get into an organization’s network that works is with phishing emails. Nearly 91% of cyberattacks begin with phishing emails, and more than 80% of reported security incidents in 2021 were phishing attacks. According to a 2021 report by CISCO, nearly 90% of data breaches occur due …
Scary Cyber Stats
Scary cyber stat: 87% of businesses hit by this in the last year You may think that cyber attacks only happen to large corporations. But unfortunately, that’s not the case. According to a recent report, almost two-thirds of small and medium-sized businesses (SMBs) suffered at least one cyber attack over the past year. That’s a …
Business Email Compromise (BEC) Attack
Business Email Compromise (BEC) Attack What is a business email compromise (BEC) attack? A business email compromise (BEC) attack is a type of cyberattack that targets businesses by sending fraudulent emails that appear to be from a legitimate source. The goal of a BEC attack is to trick the recipient into providing sensitive information, such …
Data at Risk
Is your business data at risk? Don’t take chances with old tech! When you replace old computers or external drives, do you delete the data and then just get rid of them? Without knowing it, you could be putting your sensitive data at risk. A new study by a data recovery specialist shows that millions …
LinkedIn vs. Fake Accounts
LinkedIn Takes Action to Tackle Fake Actions Why the fuss? Fake accounts are an issue because they can spread misinformation as well as disinformation (there is a real difference!), they can scam others, they can be used to troll or spam others, they can impersonate someone or an organization and denigrate their reputation. For social …
MFA EZ-R with Microsoft 365
Why the MFA? Have you ever found Multi-Factor Authentication (MFA) to be a bit…cumbersome? Complicated? Interruptive? In part, that’s what MFA is supposed to be! It’s supposed to put a pause on accessing accounts and data. And while it might seem like a drag to put up with or an obstacle to overcome, MFA is …
When Productivity Tools Aren’t Productivity Tools
Are your productivity tools actually slowing you down? Facts about productivity tools Fact: Productivity tools are meant to make you more productive. Fact: Productivity tools not properly embedded in your business will delay tasks. Fact: That will frustrate you and your employees. Fact: That will waste time. Fact: And money. Conclusion: This is the opposite …
Continue reading “When Productivity Tools Aren’t Productivity Tools”
A Growing Security Threat: Bot Malware
Bot malware is a growing cybersecurity threat If in talking about bots you begin to think of the amazing and wonderful AI chatbots that have been all over the news lately, we’d forgive you. It’s only a matter of what is most in the forefront of the news that is most in the forefront of …
Let’s Talk about AI
What’s up with AI? The whole world is suddenly talking about Artificial Intelligence (AI). What’s causing all the commotion all of a sudden? AI is writing college essays, painting masterpieces, creating original music, marketing, monitoring social media, managing healthcare, doing financial investing, driving cars, manufacturing robots, and the list only continues to grow! To be …