}
Wireless Routers: Security at Risk Due to Outdated Firmware

Wireless Routers: Security at Risk Due to Outdated Firmware

Wi-Fi routers have become ubiquitous in American businesses as a means of providing wireless Internet access. Many companies simply tuck their routers in a corner and forget about it, unless and until there is an issue with the wireless network. Unfortunately, this...
Google Chrome Tech Support Scam: What You Should Know

Google Chrome Tech Support Scam: What You Should Know

Every time the public starts to get savvy about a digital scam, hackers come up with new methods of trickery.  One of the latest in a long stream of cons specifically targets Google Chrome users. The old tech support scam. This particular hack is a new take on an...
Voice Phishing Examples: Increasing Sophistication of Phone Scams

Voice Phishing Examples: Increasing Sophistication of Phone Scams

For years, we’ve been talking about the dangers of phishing emails and have warned businesses accordingly. Still, phishing is a serious problem and one of the biggest sources of cyber losses. Hackers keep using phishing tactics because they work. It’s good for us all...
RDP Attacks: What the FBI Wants You to Know

RDP Attacks: What the FBI Wants You to Know

Continually monitoring the cyber threat landscape is an essential part of effective cyber risk mitigation.  Threats are constantly changing, so you need to stay up to date on what’s going on in the digital world. Just last month, the FBI’s division responsible...