Cyber Attack Method is Bypassing your Filters

Cyber Attack Method is Bypassing your Filters

Have you heard of callback phishing? Typically a phishing email contains some sort of message requiring the user’s urgent response. But unlike traditional email phishing, it does not contain a URL linked to a malicious site or content. Instead, it contains a phone...
Hacker Holidays!

Hacker Holidays!

Friday marks the official beginning of the holiday shopping season and no one is more excited than cyber hackers. During this time of year, the opportunities to take advantage of unsuspecting and often overwhelmed holiday shoppers create a playground for bad actors....
5 Ways to More Secure Mobile Devices

5 Ways to More Secure Mobile Devices

Mobile devices are a lucrative opportunity for bad actors not just for your personal info, but can also be an entry point into the organization you work for. While your organization may have even basic cybersecurity measures implemented for your desktop devices and...
Cyber Attack: First Four Things To Do

Cyber Attack: First Four Things To Do

Small businesses receive nearly half of all cyber attacks, but only 14% are prepared to effectively react and recover.  If you suspect your business is under a cyber attack, these are the first four things to do. 1. Isolate and contain the attack: When you suspect a...