News
Money Mules: What Others Know About You, CAN Hurt You
Since the initial popularization of the Internet in the 1980’s, hackers have been trying to break into computer systems. In the beginning, it was more of an intellectual game for many hackers trying to prove themselves and earn credibility with other hackers. In the...
Crisis Communications: Essential to Mitigate the Impact of a Data Breach
Data breaches can prove to be disastrous for your company. Not only could you potentially face civil lawsuits and government fines for failing to adequately guard your data, but you also have to worry about the public relations fallout. Customers and employees will...
Suing Companies for Data Breach Easy with Free Automated Tool
It seems a day doesn’t go by that we don’t hear something in the news about a data breach or hack hitting a major company. In the past few weeks, Facebook has admitted that the data for over 30 million users has been compromised -- just the latest in a string of...
Marriott’s New “Golden Rule” Should Be CyberSecurity At All Hotels
For some time now, Marriott, one of the largest hotel chains in the world, has been promoting its “Golden Rule” campaign to help promote kindness and treating others in a positive manner. However, it’s now become apparent that Marriott is in need of instituting such a...
Wireless Routers: Security at Risk Due to Outdated Firmware
Wi-Fi routers have become ubiquitous in American businesses as a means of providing wireless Internet access. Many companies simply tuck their routers in a corner and forget about it, unless and until there is an issue with the wireless network. Unfortunately, this...
A Reminder on Some Cyber Security Protocols
We talk a lot about basic practices your company can take to have better cyber security. But it’s worth us all reminding ourselves from time to time about these measures. It isn’t enough to have a plan in place to handle a hack when it’s happening. You have to...
Google Chrome Tech Support Scam: What You Should Know
Every time the public starts to get savvy about a digital scam, hackers come up with new methods of trickery. One of the latest in a long stream of cons specifically targets Google Chrome users. The old tech support scam. This particular hack is a new take on an...
Voice Phishing Examples: Increasing Sophistication of Phone Scams
For years, we’ve been talking about the dangers of phishing emails and have warned businesses accordingly. Still, phishing is a serious problem and one of the biggest sources of cyber losses. Hackers keep using phishing tactics because they work. It’s good for us all...
RDP Attacks: What the FBI Wants You to Know
Continually monitoring the cyber threat landscape is an essential part of effective cyber risk mitigation. Threats are constantly changing, so you need to stay up to date on what’s going on in the digital world. Just last month, the FBI’s division responsible...
U.S. Colleges Targeted by International Cyber Criminals
Two international hackers who targeted American universities have been recently convicted by a U.S. court for multiple counts of identity theft. The two hackers, Damilola Solomon Ibiwoye and Olaykinka Olaniya, were born in Nigeria but had since moved to Kuala Lumpur,...
Newsletter Sign Up
Please fill out the form below to receive a quote from one of our specialists. If you need immediate assistance, please call us at 1-888-932-7475.