Why You Should Outsource IT Support in a Recession
Bear markets are often a sign of an impending recession period. You cannot completely foolproof your business from the eventualities of an economic downturn, but you can at least prepare for what’s coming. In fact, there’s no better place to start than outsourcing your IT support. Here’s how outsourcing IT in a recession can benefit […]
Posted: January 18, 2023 | View More »Impersonation Phishing Attacks Increase as Credentials Take the Lead as the Primary Target
New data shows an upswell of email-based cyberattacks, with over 256 brands being impersonated, as social media, Microsoft, shipping, and ecommerce brands top the list. There’s been a lot of changes in the volume of email-based cyberattacks, according to security analysts at Abnormal Security. According to their H2 2022 Email Threat Report, the number of […]
Posted: September 8, 2022 | View More »Crafty Microsoft USB Scam Shows the Importance of Security Awareness Training
Just when you thought scammers couldn’t get more tricky in their attacks, this example will prove you wrong. One of our KnowBe4 colleagues shared this LinkedIn post on a recent very crafty USB scam: As you can see, the Microsoft USB looks VERY similar to a USB you would receive from Microsoft in the mail as […]
Posted: August 8, 2022 | View More »Migrate and modernize with Azure to power innovation across the entire digital estate
Cloud adoption increased significantly during COVID-19 and continues for many companies. However, an enormous migration and modernization opportunity remains as organizations continue their digital transformation. In fact, 72 percent of organizations reported their industry’s pace of digital transformation accelerated because of COVID-19, according to a survey sponsored by Microsoft in The Economist1. And that isn’t expected to slow down […]
Posted: August 8, 2022 | View More »Amazon Prime Day 2022 is Coming: Here are Quick Cybersecurity Tips to Help You Stay Safe
Amazon Prime Days this year are July 12 – 13th, 2022. As a result, cybercriminals are taking every step to capitalize on the holiday with new phishing attacks. I have been getting asked about common types of Amazon-related scams and wanted to share what to look out for. 1. What are some of the most […]
Posted: July 8, 2022 | View More »The RED FLAGS of ROGUE URLS
Spotting malicious URLs is a bit of an art. The examples represented here are some of the common tricks used by hackers and phishers to fool users into visiting malicious websites. The methods shown here could be used by legitimate services, but if you see one of these “tricks” you need to make sure you’re dealing […]
Posted: June 7, 2022 | View More »New Scam Uses Fraud Support Social Engineering To Take Victims For Thousands Of Dollars
A new scam borrows a page from the tech support scams that target older victims telling them potential fraud has been found, offering to “help” solve the issue and ultimately asking for banking details. Security researchers at Malwarebytes highlight a new scam in which victims are called offering to help the victim with identified fraud […]
Posted: June 7, 2022 | View More »Small and Medium Businesses Account for Nearly Half of all Ransomware Victim Organizations
As ransomware costs increase, along with the effectiveness and use of extortions, smaller businesses are paying the price, according to new data from Webroot. Small businesses seem to be easy prey for ransomware gangs, according to Webroot’s just-released BrightCloud Threat Report. Whether it’s an assumption (and possible realization) of less-than-adequate security and/or backups in place, […]
Posted: May 5, 2022 | View More »10 Reasons Why to Choose Azure for your Enterprise
Enterprises across the globe are realizing great success with business solutions powered by Cloud. They are redefining the way they do business with scalable & secure cloud-enabled enterprise applications. Globally, 90% of Fortune 500 companies are using Microsoft Azure to drive their business. Using deeply-integrated Azure cloud services, enterprises can rapidly build, deploy, and manage […]
Posted: April 18, 2022 | View More »A Lack of Employee Cyber Hygiene is the Next Big Threat
A new report suggests that everything from endpoints, to passwords, to training, to security policies, to a lack of awareness is all contributing to much higher risk of cyberattack. Employee cyber risk is a multifaceted issue that revolves a lot around cyber hygiene, according to new data in Mobile Mentor’s inaugural Endpoint Ecosystem Report. It […]
Posted: April 18, 2022 | View More »