Tax Season Warning: the IRS on Social Engineering
Tax Season Warning: the IRS on Social Engineering As 2020 begins and April 15th approaches, the US Internal Revenue Service wants taxpayers to keep a sharp eye out for signs of social engineering. According to tweets the IRS issued at the end of December, “The most common way thieves steal identities is simply by asking […]
5 Ways Your systems can be breached
5 Ways Your systems can be breached When it comes to business IT security, many small- to medium-sized businesses (SMBs) often struggle to protect their systems from various cyberattacks. While there are many things you can do to secure your IT infrastructure, being aware of common security threats will really help. Here are five common […]
How to pick the most secure browser
How to pick the most secure browser The internet is a Wild West of sorts, as one could never know what kind of threat they’ll come across. This is why for businesses, it’s important to identify secure browsers to keep threats at bay. Microsoft Edge Microsoft Edge, Windows’ current default browser, is an improvement over […]
Loss Aversion, endowment effect, and poor security hygiene
Loss Aversion, endowment effect, and poor security hygiene My wife has the patience and smarts to understand financial investing, various funds, and all the other things that go into managing our retirement funding. She reads constantly about different investing strategies and fund managers – things I have no desire to learn. Occasionally, she will share […]
Former hacker warns against password reuse
Former hacker warns against password reuse Kyle Milliken is back from jail, and he has some advice for you. The 30-year-old hacker from Arkansas, according to his blog, at age 17 began phishing celebrity Myspace accounts and using them to send internet marketing spam. After earning $5,000 per week, he evolved to hack millions of […]
IT Due Diligence and Network Audits
IT Due Diligence and Network Audits Whether you’re a private equity firm looking to add to your portfolio, or a business owner looking to make your business more efficient, an IT audit is important part of the process. It’s known as ‘due diligence’, and knowing what a company’s IT assets consist of (both hardware and […]
Business Email Compromise (BEC)- What You Need to Know
Business Email Compromise (BEC)- What You Need to Know According to The FBI, Business Email Compromise (BEC) resulted in $12B in losses and complaint filings, between October 2013 and May 2018. In 2018 alone, the total loss due to reported BEC scams was $1.2 billion. Most recently, a Toyota subsidiary acknowledged that on August 14th […]
We are Being Scanned
We are Being Scanned Riverbank Ruminations: Observations from the banks of the technology river TOM EVANS; ASHTON ENGINEER EMERITUS KIRK: Transmit to Starfleet our sensor readings and log entries on the planet. Surface conditions make it impossible for us to beam down and investigate further. We are therefore going on to our next assignment. UHURA: […]
Tips & Tricks to Prevent Watering Hole Attacks
Tips & Tricks to Prevent Watering Hole Attacks Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal […]
How to Address Office 365 Security Issues
How to Address Office 365 Security Issues Microsoft’s Office 365 is highly popular among businesses not just because of its robust features and cost-saving benefits, but also because it’s widely perceived as secure. Unfortunately, using it comes with security challenges, but don’t fret — there are ways to solve them. VULNERABILITIES IN SHAREPOINT Businesses typically […]