Have you ever received an email from a name you recognize, asking for a “favor”? If so, you have experienced a phishing scam. The name comes from fishing – cyber criminals are using legitimate names that you recognize to “lure” you in. Phishing tactics target users...
When most people think of multi-factor authentication, or two-factor authentication (MFA or 2FA), they think of annoying texts and challenges getting logged into accounts. So why does your IT company keep recommending that you enable it? If you are like most...
Small businesses have been in the cross-hairs of cyber attacks for years, but the methods continue to evolve. Email phishing was (and remains) the common method for hackers to infiltrate computers, compromise user accounts and gain access to money, sensitive...
Windows 11 is showing up as a Windows Update (i.e. in-place upgrade from Windows 10 to Windows 11) for some folks. A handful of people have inadvertently upgraded, not noticing exactly its intent – which is not recommended. While there is technically a path back,...
A question I’m asked frequently is whether it’s OK for employees to utilize personal DropBox or OneDrive accounts for business interactions. It really depends on your business model. Here’s what I mean: 1 – Personal means, well – personal...
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept
Recent Comments