}
A Reminder on Some Cyber Security Protocols

A Reminder on Some Cyber Security Protocols

We talk a lot about basic practices your company can take to have better cyber security.  But it’s worth us all reminding ourselves from time to time about these measures. It isn’t enough to have a plan in place to handle a hack when it’s happening. You have to...
Google Chrome Tech Support Scam: What You Should Know

Google Chrome Tech Support Scam: What You Should Know

Every time the public starts to get savvy about a digital scam, hackers come up with new methods of trickery.  One of the latest in a long stream of cons specifically targets Google Chrome users. The old tech support scam. This particular hack is a new take on an...
Voice Phishing Examples: Increasing Sophistication of Phone Scams

Voice Phishing Examples: Increasing Sophistication of Phone Scams

For years, we’ve been talking about the dangers of phishing emails and have warned businesses accordingly. Still, phishing is a serious problem and one of the biggest sources of cyber losses. Hackers keep using phishing tactics because they work. It’s good for us all...
RDP Attacks: What the FBI Wants You to Know

RDP Attacks: What the FBI Wants You to Know

Continually monitoring the cyber threat landscape is an essential part of effective cyber risk mitigation.  Threats are constantly changing, so you need to stay up to date on what’s going on in the digital world. Just last month, the FBI’s division responsible...
U.S. Colleges Targeted by International Cyber Criminals

U.S. Colleges Targeted by International Cyber Criminals

Two international hackers who targeted American universities have been recently convicted by a U.S. court for multiple counts of identity theft. The two hackers, Damilola Solomon Ibiwoye and Olaykinka Olaniya, were born in Nigeria but had since moved to Kuala Lumpur,...