Security

Learn about Security on our blog

New Facebook Phishing Attack Could Fool Many

I just received a Facebook Messenger message from a good friend yesterday. He apparently saw me in a video and thought I'd be interested in watching it. He's a friend who does send me interesting stuff once in a while and there was no reason not to click through....

read more

Can You Trust Your Lawyer?

Law firms and lawyers are a profession we sometimes need to rely upon. We depend upon them to manage family matters, custody issues, contract disputes, and criminal matters. Many times, these issues are personally, professionally, or economically sensitive. For this...

read more

Have You Been Owned/Pwned?

The term "Pwned" comes from video game culture and means "owned" (since the "o" and "p" characters are beside each other on a keyboard). Pwned implies domination, humiliation and ownership by an opponent. It is a taunt that you have been soundly defeated. "Pwned" has...

read more

Complexity Made Simple: A Case Study of a Phishing Attack

Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...

read more

Ransomware Red Flags: 7 Signs You’re About to Get Hit

It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...

read more

Google? No Thanks; We Use Microsoft (Part-2)

(If you haven't read part 1, you can do so here.) In this article, we'll talk about Google Drive File Stream. Perhaps you've used the free Google Drive. Unless the document you create or open a Google doc of some sort (doc, sheet, slide, etc.) you have to download it,...

read more

3 Things to Watch for in Preventing Business Email Compromises (BEC)

Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.

What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.

read more