Cyber Attack Method is Bypassing your Filters

Cyber Attack Method is Bypassing your Filters

Have you heard of callback phishing? Typically a phishing email contains some sort of message requiring the user’s urgent response. But unlike traditional email phishing, it does not contain a URL linked to a malicious site or content. Instead, it contains a phone...
Hacker Holidays!

Hacker Holidays!

Friday marks the official beginning of the holiday shopping season and no one is more excited than cyber hackers. During this time of year, the opportunities to take advantage of unsuspecting and often overwhelmed holiday shoppers create a playground for bad actors....
Do your backups have your back?

Do your backups have your back?

From customer information to financial records, your company’s data is invaluable so it’s crucial to have a reliable backup strategy in place. Whether to protect data from being compromised or lost due to cyberattacks or to be able to quickly recover from...
5 Ways to More Secure Mobile Devices

5 Ways to More Secure Mobile Devices

Mobile devices are a lucrative opportunity for bad actors not just for your personal info, but can also be an entry point into the organization you work for. While your organization may have even basic cybersecurity measures implemented for your desktop devices and...