blog

We’ve Covered Phishing…. but what is Vishing?

By Jennifer Adams

According to the Norton Security website, 75% of fraud complaints reported to the Federal Trade Commission involve scammers contacting their victims by telephone to steal financial, Medicare or tax information. This can happen to individuals and businesses. Once this information is stolen, the hacker can easily impersonate you. This is what you need to know about vishing so you can make sure it doesn’t happen to you.  

Tags: 

What You’ve Been Wanting to Know About the Dark Web

By Jennifer Adams

Have you ever thought about how the internet works? There are multiple layers, the surface web, the deep web, and the dark web, each serving a different purpose. Understanding the different layers of the internet and how it works can help keep you safe while surfing.  

Tags: 

The Most Overlooked Security Threat

By Jennifer Adams

When thinking of ways hackers can infiltrate your system, what first comes to mind? Phishing emails and suspicious looking pop-ups are commonly known ways to infect your devices with malware. A frequently overlooked cybersecurity vulnerability is your removeable media. CD’s, DVD’s, flash drives… Just think, how important is the information stored there? These are the risks associated with removeable media and how to manage them.

Tags: 

They’re Not All Harmless – How Computer Worms Work

By Jennifer Adams

When worms are mentioned, most people typically think of bait used for fishing or gummy worms. While these worms are harmless, computer worms aren’t. Once they are in your computer, they quickly infiltrate your files and spread by sending compromised emails containing identical worms to each of your contacts. This is how computer worms work and how they compromise your security.

What are Computer Worms? 

Tags: 

Understanding threats – The difference Between Malware and Viruses

By Jennifer Adams

“Malware” and “virus” are catch-all terms used to refer to cybersecurity threats that are often used interchangeably, but what is the difference? What impact do they have on your network? Understanding the difference between a virus and malware is helpful if you encounter a situation that you must address.  Keep reading to find out more.

Malware:

Tags: 

If it’s too good to be true, it is. How to spot Trojan Horses

By: Jennifer Adams

Just like the Greeks were able to gain access and take the city of Troy by hiding soldiers in a giant wooden horse gifted to them so they could gain access and attack, hackers use trojan horses to trick you into inviting them into your network. Here are a few different kinds of trojans, how to spot them so they do not infect your network, and what to do if you believe one is on your computer.

What is a Trojan Horse?

Tags: 

Everything You Need to Know About the Most Dangerous Security Threat

By Jennifer Adams

Tags: 

Are they Phishing for your information? Here’s how to tell

By: Jennifer Adams

Tags: 

Why Your Data Is Less Secure on Paper Than in the Cloud

By Jennifer Adams

Tags: 

What is your ROI on Cybersecurity?

By Jennifer Adams 

According to Tech Republic, “Figuring a cybersecurity budget is a combination of emotion and guesswork.”  With security spending on the rise, IT professionalshave the latest technology and security tools at their fingertips to protect their organizations most valuable data.  But how much security do you need? How do you know you are investing in the right products?  What is ROI on cybersecurity? The answers to these questions depend on several factors.

Tags: 

Pages

Subscribe to RSS - blog