There was a time when installing an antivirus program was enough to secure your data, but that’s no longer the case today. Whether you want to keep your online activities hidden from third parties or prevent your data from being intercepted by hackers, you need to invest in a virtual private network (VPN). What is […]
CEO Article by Larry Johnson
The Olympics have just finished, and we have had some examples of great performances in the Tokyo games. I watched as two USA wrestlers were down to the last seconds when they won their matches. Gable Stevenson was down to less than 2 seconds when he came back to win, and David Taylor had less than 14 seconds when he won his match.
The good. The bad. The ugly. Pretty much describes your inbox, doesn't it?
What's tough is sometimes you can't tell which are which. Is the email coupon from Round Table (20% off the Hearty Bacon Supreme!) good, or an ugly phishing attempt?
Is the notice from Netflix that your account needs renewing just one of those bad emails that wants your money for services, or is it an ugly attempt to just take your money?
If you had the Catch Phish Email Analysis icon in your email menu, you wouldn't have to wonder.
The New Normal
Remote work is the new normal in our COVID-19 universe. As one of our team members explained:
“I’ll be a bit late to my office. Traffic is crazy. There was a massive pile-up of a bike, a helmet, frozen toys and a shoe blocking the entrance to the off-ramp to my home office this morning.
The adage "never let a good crisis go to waste" applies to hackers everywhere. And the Coronavirus is the perfect crisis to exploit.
Sophos, one of Adept's security vendors, reports on one Coronavirus scam. They explain, "The fake page consists of the official, current home page of the World Health Organisation (WHO), with an unassuming popup form on top of it.
January 14, 2020 is the end of life for Windows 7.
WHAT DOES THAT MEAN?
No more security updates--you are on your own. Without these security patches, Windows 7 systems will become substantially more vulnerable to viruses, malware, and third-party software exploitations.
Tension between Iran and the United States has prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert.
Historically, Iran has resorted to cyber activities for retaliation.
Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays to stay abreast of such […]
Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion […]
VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed […]