New Cyberattack Uses Microsoft PowerPoint Mouse Hover Feature

In late May of this year, a new cyberattack technique was discovered that delivered malware via the mouse hover feature in PowerPoint files. This technique debuted in a spam campaign that targeted the United Kingdom, Poland, Sweden, and Netherlands.

What The Cloudflare Leak Could Mean For Your Business

Cloudflare, a major CDN service, has accidentally leaked customers’ sensitive information for the past few months. On February 17th, Tavis Ormandy, from Google’s Project Zero, notified the CloudFlare security team of leaked data that he came across while working on a corpus distillation project. According to Ormandy, “This information included private messages from major dating sites, full messages from a well-known chat service, online password manager data, and hotel bookings. We’re talking full https requests, client IP addresses, full responses, cookies, passwords, keys, data, everything.”

When You Don’t Want Your Name In The News

Not all publicity is good publicity, especially when it comes to a cyberattack. A cyberattack can hurt your business’ data, reputation, and cost you future sales. Within the first month of 2017 there have already been a multitude of cyberattacks. These victims include businesses just like yours, with headlines reading Lloyds Customers Hit by Cyberattack, Austrian Hotel Forced to Pay Ransom Following Cyberattack, and Cyberattack Shuts Down Sundance Box Offices. These breaches can happen at anytime, and to anyone. The next big data breach is not an if, it’s a when.

Hang Up It’s A Phone Scam

Every year millions of people fall victim to phone scams. In a recent study on 2015, approximately 11% of the adult population in the United States (27 million) fell victim to a phone scam. The total losses amounted to roughly $7.4 billion. Each year the number of victims continue to increase. Whether it’s the IRS calling about money owed or a relative has been kidnapped and the caller is requesting ransom, there are a few things to remember when it comes to these unsolicited calls.

Phishing Guide: Don’t Take The Bait

If you use email, it’s likely you have come across a scam attempting to trick you into giving them important personal information such as your social security number, passwords, or credit card numbers. These emails at a glance will seem trustworthy and sent from what looks like a website you frequently visit or a mailing list you’re subscribed to. When you’re quickly skimming through emails, it is easy to miss the small tell-tale signs of this trap, known as a phishing scam. Although these hackers are crafty, there are several things to look for to make sure you don’t take the bait.

A Smart What? The Tech Predictions for 2017 Series: Internet of Things

Welcome to 2017 and the next installment in our series on tech predictions for the year. You may have heard about the recent Consumer Electronics Show in Las Vegas. The CES is one of the largest events showcasing the latest gadgets and advancements that will soon become available to the public. It’s become the first glance at the latest in Internet of Things. IoT is better known as all of the smart devices that are making your environment more connected to your phone or tablet. These items are growing in popularity, and items such as the Google Home Voice Command Device have even made the news. IoT are fun and advanced items, but are they for you?

Cybersecurity Threats To Watch For In 2017

It’s time to reflect on this past year and resolve to make the next one better. There has been an escalation of hacks in 2016 and it’s not going end any time soon. In fact, cybersecurity threats are becoming more strategic at targeting businesses’ vulnerabilities. As technological developments continue to rapidly advance and the world becomes even more dependent on their devices, we forecast a significate increase of attacks in 2017. Predicting cybersecurity threats for 2017 involves tracking and analyzing this past year’s major attacks as well as anticipating new and evolving threats. New Year’s resolutions are often broken by mid-February but ones that businesses can’t afford to break are those involving cybersecurity. With 2016 quickly ending, we’ve broke down the top cybersecurity threats you need to prepare for in 2017.

Cybersecurity: From the Break Room to the Boardroom

Every employee plays a vital role when it comes to cybersecurity within their organization. A simple opening of an attachment in an email from an unknown sender can corrupt your entire infrastructure. An unlocked computer can become an easy access point for valuable company information. Improper downloading of software online can welcome malicious malware into your network. Whether an employee is on their cell phone in the break room or using their laptop in the boardroom these simple user errors can end up costing your organization big time.

You Might Be A Techie If…

Your MacBook is running virtualized Windows or if the last thing that comes to mind when you hear the word “Cloud” is the puffy white things in the sky. October 3rd was National Techie Day and with recent TV shows and movies fantasizing computer hacking, being a “Techie” has become quite the fad. It has also muddied the water of what a true Techie is. Here Are Some True Techie Identifiers:

4 Simple & Inexpensive Cybersecurity Tips

Cybersecurity is one of the largest threats an organization will face when it comes to the safety of their data. IBM recently sponsored the 11th Annual Cost of Data Breach Study conducted by the Ponemon Institute.  In their research they’ve found the average consolidated overall cost of a cybersecurity breach has risen to $4 million.  No matter… Continue reading 4 Simple & Inexpensive Cybersecurity Tips