Cyber Phishing 101

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.  What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, Continue Reading

Are you on a Hackers Watchlist?

In the last decade, billions of people have had their information stolen from one, if not multiple, business sectors. Technology is constantly expanding, and with new technology comes new ways of hacking into seemingly secure data. As technology advances, people tend to forget about outdated technology and are lackadaisical about security. Outdated devices, human error, malware and theft are all things that contribute greatly to the possibility of a data breach. It’s important to ensure companies are well Continue Reading

Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into.  Viruses: These act Continue Reading

The Cyber Threat That Holds Your Data For Ransom

“One million dollars!”  It’s the classic line from Dr. Evil, the villain from Austin powers, when he threatens the world with a nuclear bomb. This iconic scene may bring laughter to our minds, but in real life anything dealing with ransom is typically void of laughter. Ransomware is no exception!  What Is Ransomware? Ransomware is a software, paired with a hacker, that kidnaps your data and ransoms your company! When this happens, you have limited options; Continue Reading

Social Engineering = Fancy Job Title for Hackers

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud; in fact, it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled Continue Reading

Is the Dark Web all bad?

Dark Web: (noun) Part of the world wide web that is only accessible by utilizing special software, allowing users and websites to remain anonymous or untraceable. It exists on an encrypted network that uses masked IP addresses to maintain anonymity for users and site owners.  If this is all new to you check out our earlier article; What is the Dark Web As you can see by the above definitions, the Dark Web can be a shady place where illegal Continue Reading

Passwords – Outdated and Dangerous, But Necessary?

Here’s a quick test – what do these seemingly random alphanumerical groupings have in common?   123456  password 123456789  12345678  12345 111111  1234567  sunshine  qwerty  iloveyou That is a list of the top ten passwords used in 2018. Recognize any of these? If you don’t, you’re not necessarily in the clear, but your chance of becoming compromised or hacked is far less than someone who uses one of these passwords. If you do recognize these, you’re certainly testing your luck.   These days, Continue Reading

What is the Dark Web

What is the Dark Web and Why Should We Care?  You’re happily humming along on the internet, thinking you’ve got a pretty good understanding. You can navigate your way around Google, Facebook, Amazon, and news sites. You’re actually only visiting four percent of the internet. There’s a whole world hiding beyond these safe surface-level sites, known as the Dark Web and it’s a much less hospitable place.  What exactly is the Dark Web?  The Dark Web is Continue Reading