Business Email Compromise (BEC) Attack What is a business email compromise (BEC) attack? A business email compromise (BEC) attack is a type of cyberattack that targets businesses by sending fraudulent emails that appear to be from a legitimate source. The goal of a BEC attack is to trick the recipient into providing sensitive information, such …
Category Archives: Cyber Security
Data at Risk
Is your business data at risk? Don’t take chances with old tech! When you replace old computers or external drives, do you delete the data and then just get rid of them? Without knowing it, you could be putting your sensitive data at risk. A new study by a data recovery specialist shows that millions …
MFA Fatigue
While you were sleeping… MFA Fatigue No, it’s not the 1995 romcom about miscommunications and star-crossed lovers. It’s the reality that can happen while you are sleeping or simply just sleepy. Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app? Especially when you’re just about to fall asleep? …
Greener in the Cloud
Could your business go green by switching over to the cloud? Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. Not only that, cloud computing allows for the real possibility of reducing the carbon footprint left by organizations and agencies. The reason …
Look Out for Juice Jacking!
Don’t charge in public charging stations! It’s convenient. You’re on the go. You’re running low on charge and, lo and behold, there is a charging station, right there, in the middle of the airport, hotel, café, mall, or wherever you happen to be working on the go. So, what do you do? An ordinary person …
LinkedIn vs. Fake Accounts
LinkedIn Takes Action to Tackle Fake Actions Why the fuss? Fake accounts are an issue because they can spread misinformation as well as disinformation (there is a real difference!), they can scam others, they can be used to troll or spam others, they can impersonate someone or an organization and denigrate their reputation. For social …
Three Essential Tools for Security
Three Essential Tools for Cybersecurity for Every Business Keeping the Most Valuable Asset Secure Data is the most valuable asset of any business. Safeguarding and securing it should be one of your main priorities. If you don’t have much or any security in place for safeguarding your data, you should be implementing a minimum of …
A Growing Security Threat: Bot Malware
Bot malware is a growing cybersecurity threat If in talking about bots you begin to think of the amazing and wonderful AI chatbots that have been all over the news lately, we’d forgive you. It’s only a matter of what is most in the forefront of the news that is most in the forefront of …
Your Phone Needs Security Too!
Our Phones are Goldmines If you think about it, our phones are goldmines of private information, from all the financial details, personal messages, banking apps, photos, contacts, etc. that live behind that little glass screen! And if your company or team uses phones for work, they’ll often have access straight into company systems: email, contact …
Cyber attacks are getting bigger and smarter.
Are you vulnerable to cyberattacks? Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of people all trying to do the same thing at the same time? The ticket site falls over – usually temporarily – because the server is overloaded …
Continue reading “Cyber attacks are getting bigger and smarter.”