Blog

We’ve Covered Phishing…. but what is Vishing?

Hand holding smart phone with vishing calling with a blue background behind phone and hand

By Jennifer Adams

According to the Norton Security website, 75% of fraud complaints reported to the Federal Trade Commission involve scammers contacting their victims by telephone to steal financial, Medicare or tax information. This can happen to individuals and businesses. Once this information is stolen, the hacker can easily impersonate you. This is what you need to know about vishing so you can make sure it doesn’t happen to you.

What is Vishing?

What You’ve Been Wanting to Know About the Dark Web

the words dark web in red on a green background of code

By Jennifer Adams

Have you ever thought about how the internet works? There are multiple layers, the surface web, the deep web, and the dark web, each serving a different purpose. Understanding the different layers of the internet and how it works can help keep you safe while surfing.  

The Most Overlooked Security Threat

Cloud technology icon with a lock icon in the middle of the cloud

By Jennifer Adams

When thinking of ways hackers can infiltrate your system, what first comes to mind? Phishing emails and suspicious looking pop-ups are commonly known ways to infect your devices with malware. A frequently overlooked cybersecurity vulnerability is your removeable media. CD’s, DVD’s, flash drives… Just think, how important is the information stored there? These are the risks associated with removeable media and how to manage them.

They’re Not All Harmless – How Computer Worms Work

Green worm with pink dots and big eyes on a computers motherboard

By Jennifer Adams

When worms are mentioned, most people typically think of bait used for fishing or gummy worms. While these worms are harmless, computer worms aren’t. Once they are in your computer, they quickly infiltrate your files and spread by sending compromised emails containing identical worms to each of your contacts. This is how computer worms work and how they compromise your security.

What are Computer Worms? 

Understanding threats – The difference Between Malware and Viruses

Side view of a pc monitor, a string of words leak, virus, spyware, Trojan highlighting in red font among a chaotic set of green computer symbols.

By Jennifer Adams

“Malware” and “virus” are catch-all terms used to refer to cybersecurity threats that are often used interchangeably, but what is the difference? What impact do they have on your network? Understanding the difference between a virus and malware is helpful if you encounter a situation that you must address.  Keep reading to find out more.

Malware:

If it’s too good to be true, it is. How to spot Trojan Horses

Black and white painting by Motte of a trojan horse next to the walls of Troy

By: Jennifer Adams

Just like the Greeks were able to gain access and take the city of Troy by hiding soldiers in a giant wooden horse gifted to them so they could gain access and attack, hackers use trojan horses to trick you into inviting them into your network. Here are a few different kinds of trojans, how to spot them so they do not infect your network, and what to do if you believe one is on your computer.

What is a Trojan Horse?

What is your ROI on Cybersecurity?

A man sitting at a table with a device that projects a virtual screen that has the letters ROI and a graph. ROI, Return on investment business and technology concept.

By Jennifer Adams 

According to Tech Republic, “Figuring a cybersecurity budget is a combination of emotion and guesswork.”  With security spending on the rise, IT professionals have the latest technology and security tools at their fingertips to protect their organizations most valuable data.  But how much security do you need? How do you know you are investing in the right products?  What is ROI on cybersecurity? The answers to these questions depend on several factors.

Subscribe To Updates

Get notified of important Xerox news and helpful articles from XETX.