Phishing Attacks

Small Businesses Are Hacked 3x More Than Larger Ones

Have you felt more protected from cybersecurity attacks because your business is smaller? Perhaps you believe the business possesses nothing that a hacker could want. How can they even know about your small business? Well, let’s get into why small businesses are hacked 3x more than larger ones. This thought processes is a common misconception…

Most Common Misconceptions About Ransomware

Businesses of all sizes face a daily threat from ransomware attacks. Last year alone, US businesses lost up to $160 billion as a result of ransomware attacks. Unfortunately, this number is anticipated to grow in the years ahead. For those of you who question whether ransomware would ever effect you, let’s get into the most…

Twilio Data Breach and Massive Lay Offs

AWAH-Twilio On this installment of “Another Week, Another Hack” we’re talking about Twilio.  More importantly, we’re talking about the Twilio data breach and massive lay offs that transpired this week. Twilio, for those of you who don’t know, is an engagement platform that partners with multiple big named corporate entities.  Unfortunately, the communications giant announces…

Think Twice When Receiving Urgent Messaging

One of the biggest risks to the security of your company is through phishing schemes. Here’s why you should think twice when receiving urgent messaging. It could save your network. A staggering 83% of businesses report successful phishing attacks against them last year. Statistically, only a third of phishing emails are ever opened. However, the chances of someone from…

How the SLAM Approach Can Help Detect Phishing

There is a reason you almost always see phishing as a part of security awareness training. It has been the primary method of online attack over the past decade or two. Phishing emails are used to initiate ransomware, credential theft, data breaches and more. In an effort to keep you protected, learn how the SLAM…

Which Form of MFA is Most Secure Vs. Most Convenient?

The prevalence of data theft is now at an all-time high, and it is this form of attack that is most responsible for data breaches. That’s why implementing Multi-Factor Authentication (MFA) is more important than ever. In this blog post, we’ll go over which form of MFA is most secure vs. most convenient. Having access…

STOP Using Email As Your Storage Solution

More and more people are utilizing their email as a one stop shop for storing data that they send and receive. Convenient? Yes. Secure? Maybe Not. In this post, we’ll reveal to you why you should stop using email as your storage solution.  Doing anything these days has become easier and faster as IT becomes…

Signs that Malware May be Infecting Your Computer

When a business is subjected to a malware attack, it can take up to a week or longer to fully restore access to their data and systems. Do you know the signs that malware may be infecting your computer? Of course we use malware as an umbrella term. Malware encompasses any type of malicious activity…

How Frequently Should You Train Staff on Cybersecurity Awareness?

Let’s say you complete a yearly phishing training with your company. This involves educating staff on how to spot phishing emails and scams. You feel good about doing this annually. Up until 5-6months later when your company suffers a pricey ransomware attack due to a phishing link. Then you might be asking yourself, how frequently…

New Phishing Technique TRICKING Tech Experts

Have you ever fallen victim to a phishing scam? You got an email you thought was coming from your boss, and next thing you know you’re wiring your bank account to some guy half way around the world. Normally, we would advise individuals to avoid falling victim to phishing by checking the email address for…