How To Recognize Credit Card Skimmers
In the modern age of technology, the risk of theft goes beyond thieves physically stealing your money. One source of theft that is very prevalent today is credit card skimming. Credit card skimmers insert a device into payment terminals in places like gas pumps and ATMs. When you swipe or insert your card, the device […]
Working Remotely During COVID-19
As the deadly strain of coronavirus known as COVID-19 continues to ravage our nation, many businesses are concerned about keeping their employees safe and productive. During these difficult times, we are here to help. We are completely equipped to take care of what you need and offer support both on-site and remotely. We are also […]
Fixing Your Weakest Link: Your Employees
Fixing Your Weakest Link: Your Employees You can have every piece of security hardware in the books: firewall, backup disaster recovery device, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible? Create and Strictly Enforce […]
Breaches – Are you on a Hackers Watchlist?
Since 2010, billions of people have had their data stolen from one or more business sectors. The field of technology is constantly expanding, and with new technology comes new ways of breaching seemingly secure data. As technology advances, people tend to forget about outdated technology and grow less concerned about security. It’s critical to ensure […]
Heritage Company Fires 300 Employees Following Ransomware Attack
This is not the news anyone wants to hear. Just before Christmas, the CEO of The Heritage Company had to tell his 300 employees some really bad news – they were fired. Why? They had been hit by ransomware and they didn’t know when / if they would be operational again. This is why it […]
Mischievous Malware – Part 2 – Malvertising
We are continuing our discussion from yesterday about mischievous malware. Now that you are a bit familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam. Malvertising. This has been gaining headway on Google, so much so, they created an individual landing page asking consumers […]
Mischievous Malware – Part 1
Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of mischievous malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal […]
Social Engineering – Part 2 – Internal Threats
Yesterday, we started looking at Social Engineering. Today, we will look at some internal threats and more… Internal Threats Originally, social engineering took place in a physical setting. A hacker would do some preliminary research on a company structure or focus on behaviors in order to get that initial access into a building, server room […]
What is ransomware, and how can you protect your business against it?
Imagine this. It’s 6am on Monday morning and you walk into your office, ready for another week of work. You sit down at your computer to check your email, but you suddenly realize that something is wrong. You can’t access anything, and your computer appears to have been locked down while you were out of […]
Georgia County Forced to Pay Hackers $400,000 To End Ransomware Attack
A Georgia county was forced to pay $400,000 to cyber criminals last week to get their systems back online after a devastating cyber attack. From 11Alive: A ransomware attack that impacted Jackson County emergency services and crippled the government’s computer systems cost the rural community $400,000, the county manager confirmed Saturday. County manager Kevin Poe said that […]