Blog

Technology expertise, advice and tips

Blog

  1. Listening In on a Private Videoconference (and other new cybersecurity threats. )

    While many of us are gearing up for a (smaller than usual) Thanksgiving celebration, hackers are still targeting emails, passwords and even videoconferencing.  Here’s what’s happening right now in the world of cybersecurity. Beware of “Site Notifications” – It seems like more and more sites (especially news sites) are presenting readers with a pop-up window…

  2. Three Questions for Your Line-of-Business Software Provider

    If you run a business, there’s a good chance that you are using a line-of-business (LOB) application – software built specifically for businesses in your industry to get things done.  If you’re in a big industry, it’s probably made by a billion-dollar software company.  If there are only a few thousand companies like yours in…

  3. How Do You Know If an Email is Fraudulent?

    There are some very convincing email phishing attacks out there.  We’ve talked about several of them – the one that pretended to be a cybersecurity training update, the one that uses a real Microsoft login prompt, and one that uses Google Forms to copy your bank login page are just a few of the best…

  4. Business Cybersecurity News: Early November, 2020

    New data confirms that ransomware remains a major threat for small and mid-size businesses, and extortion was taken to a new level this month – here’s what’s happening in the cybersecurity world right now. Coveware Q3 2020 Report Details Ransomware Risks Ransomware response company Coveware has released their quarterly ransomware report, which provides a wealth…

  5. Beware of Fake Bank Account Login Pages

    On the day of his assassination, Abraham Lincoln signed the act that created the Secret Service.  It wasn’t created to protect presidents, however.  It was created to combat counterfeiting – around one-third of all currency in the US was counterfeit in the 1860s.  We’ve been fighting counterfeiting ever since; counterfeiters figure out how to make…

  6. Business Cybersecurity News: Late October, 2020

    Phishing emails continue to grow more sophisticated, ransomware is identifying high-value victims, and cloud-native apps are a growing security problem.  Here’s what’s happening right now in the world of SMB cybersecurity.  Ransomware Now Picking Victims – A ransomware variant has recently been spotted using PowerShell scripts that help identify high-value victims.  Once access to a…

  7. For Most Employees, Culture Drives Productivity

    When COVID-19 hit in March, there was a lot of fast movement by IT teams to get employees working productively from home.  Most people felt like the following few weeks would be a very challenging time.  But then weeks out of the office started to look more like months and then quarters, and the focus…

  8. What is Credential Stuffing, and Why Does It Matter?

    Have you been in a situation where you didn’t have access to your password for a website or app and couldn’t remember it?  One of the most annoying things about this situation is when you guess incorrectly a few times and the account gets locked.  Depending on which website you’re trying to use, unlocking the…

  9. Business Cybersecurity News: Early October, 2020

    “Land and expand” was dangerous enough when it was used as a sales strategy.  Now, it’s increasingly being deployed by cybercriminals to maximize their profits.  Here’s what’s happening this month in cybersecurity news. Microsoft Office is a Top Target for Cyberattacks With so many people working from home, Office365 has become one of the most…

  10. Cyberattacks Pose as Cybersecurity Training

    If you received one of the “Nigerian Prince” scam emails in the earlier days of the internet, you may have been left wondering who exactly falls for those things.  The story was implausible and the grammar was terrible.  But the reality is that today’s scammers are far, far more creative when it comes to building…