Working from home on a personal device? DON’T DO THIS!

April 23rd, 2020

Is It Safe to Work from Home On Your Personal Device?
Most employees are required to work from home these days, and their mindset may be, "I may as well use my device such as a home computer." Using your personal device is a dangerous mistake.

How to spot a phishing scam e-mail

April 14th, 2020

COVID-19: WEEKLY TIP #1: Spotting a Phishing Scam E-mail
It's the perfect time for hackers to send phishing scam e-mails with dangerous malware and viruses. Right now, your inbox is filled with "COVID-19" subject lines and coronavirus-focused e-mails.

Hackers are even using phishing scams with fake CDC-gov e-mail address that's not legitimate and spamming inboxes.

Computer Safety: Weekly CyberSecurity Tips

March 11th, 2020

Computer Safety Protocols for your Small Business
In January of this year, 1.76 billion user records leaked. User information and plain text passwords were extracted from 772 million users, while 854 GB of data exposed CV's containing sensitive information on 202 million Chinese users, and an Oklahoma government data leak resulting in 7 years of FBI investigations.

5 Ways to Increase your Internet Security

December 26th, 2013

The theft of your personal information, then use of it without your permission, is identity theft. Identity theft is one of the fastest growing crimes in the United States, and can have devastating effects on personal and business finances, credit history, and reputation.

Security Predictions for 2014: What You Should Be Watching Out For

December 24th, 2013

WatchGuard Technologies, a prevalent company in the world of security predictions, has released its list of the top eight or so security problems it expects will happen in 2014. These security risks range from ransomware advancements all the way to data breaches and infrastructure exploits.

5 Simple Steps to Increase Your Internet Security

December 7th, 2013

The importance of internet security is well known. However, safety and security on the internet are like a dense, confusing smoke screen – a hazy area that is difficult to see through and confusing to understand. We know that there are dangers in using the internet, and often accept the risks blindly.

Do You Know What a Dangerous Email Looks Like?

November 15th, 2013

You probably receive daily obvious scams to your inbox every day. These are emails that talk about friends or long lost relatives in a far-away land that either need money or want to give you obscene amounts of money because someone has died or they just don’t need it anymore.

Google Study Reveals Worst Password Choices

September 29th, 2013

Even passwords we think are secure aren’t, a new Google study shows. In fact, passwords that may seem hard to guess to us may be the first passwords a hacker tries when trying to enter your account. Google’s new study of over 2,000 people aimed to figure out what passwords were being used, and the habits people had when it came to choosing passwords.

What is a Watering Hole Attack?

The terminology of online security threats continues to change, and the creative naming can be both ambiguous and explanatory. The most recent concern being Watering Hole Attacks, which are an increasing risk with the growing use of personal devices and cloud services.