Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...
Cybersecurity
3 Things to Watch for in Preventing Business Email Compromises (BEC)
Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.
What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.
DNSÂ Firewalls: A New Tool to Protect your Business
If your computer connected to a DNS Firewall instead of a regular DNS and you typed in “yotube.com” (note the missing “u” from “you”), the attack will be thwarted. Yotube.com is a known phishing site that tries to download malware (viruses, worms, ransomware, botnets, etc.) to anyone who mistakenly tries to visit it.
Twitter Hacked: What is Social Engineering?
Yesterday, Twitter announced that it had been hacked. Hackers seemed to target a number of accounts belonging to cryptocurrency companies and executives as well as VIP accounts of Joe Biden, Barack Obama, Kanye West, Bill Gates, and Elon Musk and others. The target...
Hate-hacking, Zoom Bombing and Working Remotely in the Era of BLM
Working remotely has become the preferred technique of many businesses as they pivot to serving clients and customers in the age of COVID-19. Moving to a hybrid work environment with some employees working from home while others continue working out of the office...
What’s this Buzz about Zoom? What Else is There?
In a time when we are starved for human connections in our personal lives and virtual meeting options in our business lives, Zoom came along. It was slick and well marketed. Sure the free version was limited to 40 minute calls if you had a party of 3 or more, but it...
How Can I Protect Myself from SIM Swapping?
Before we get to "SIM Swapping", two Factor Authentication (or 2FA) is also a term that has been in the news recently. It is a way of securing your email, banking, and social media accounts by requiring you to authenticate using more than one factor to prove your...
What is a Password Safe?
Tired of having to pick a password that has at least 8 characters and at least one uppercase, lowercase, digit and special character (but not a / or -) and can't be any of your past passwords or contain your username, first or last name? Tired of writing all these...
Google Mail Helps Keep Your Business Safe
Most of us know about the "Spam folder"–the place where mail gremlins send messages that they think is garbage. Depending on your email system, this decision could be based on whether you've ever sent or received mail from that address before, or if it has too many...
Microsoft will no longer be providing support for Windows 7 and Windows Server 2008 as of January 14, 2020
This includes any security patches and updates, system patches, and technical support. If you or someone you know is still running Windows 7 (or heaven forbid, Windows XP) workstations in their office, They are at a huge risk of malware or a ransomware attack. Atlas...