Blog

Thing #2: Enable 2FA. (But what is Two Factor Authentication (2FA) and why is it so important)?

Simply, two-factor authentication is an extra layer of protection for user accounts. To log-in, you’ll need something you know (your password) and something you hold (such as your smartphone).

First things first, passwords are NOT good enough. Just like continuously changing technology, cybercrime is ever changing and has unfortunately becomes more commonplace.

Thing #1: Prepare for the End of Windows 7

Our 3 part-series, 3 Things Every Business Needs to Accomplish in the Next 6 Months, launches today. The first article in our series is regarding the critical process of preparing for the end of Windows 7. 

 

Do Windows pop-up's on the corner of your computer annoy you? Those reminders aren't there to pest you, but to warn you about the critical end of Windows 7. In January 2020, Windows 7 will no longer be supported or patched by Microsoft.

LATEST CYBERSECURITY ATTACKS END UP WITH YOUR EMPLOYEES NOT GETTING PAID

Here is a scary, but very real story: A company had an employee receive an email from their HR/Accounting department asking the individual to update their direct deposit information, or so the person thought was their colleague.

The employee went on and replied to this email including their bank account information to the “HR/Accounting department”. The individual then followed up (days or weeks later) with their HR/Accounting department when they did not receive a paycheck!

The email, in fact, was not from the person’s employer, but indeed from a cyber-attacker.

Microsoft Office 365- What You Need To Know

If you haven’t heard, Microsoft decided to join the software subscription craze and launched their Office version, Microsoft Office 365. Office 365 works the same as the previous version of Office, but it offers users real-time software updates as well as a few other perks.

5 Email Security Awareness Warning Signs

This email is from someone outside my organization and it's not related to my job responsibilities.

I was cc'd on an email sent to one or more people, but I don't personally know the other people it was sent to.

Is the email message a reply to something I never sent or requested?

Do I have an uncomfortable gut feeling about the sender's request to open and attachment or click a link?

I hover my mouse over a link that's displayed in the email message, but the link-to address is for a different website.

A bad place to click this week

Let's walkthrough a very typical Office 365 phishing campaign and then review the ramifications.You receive an email like the above, notice the misspelled email address in the FROM: field.  Also, see the inconsistencies in the capitalization.IF you click the link you end up at similar looking but "hacked" SharePoint page with another weird link.

Cybersecurity is now a MUST have department in your organization

Cybersecurity is now a MUST have department in your organization

MORE than ONE in every FOUR users is susceptible to clicking on a phishing email potentially creating any of the below scenarios (once they are properly educated – this number falls to below 3%).
These scenarios are ACTUALLY happening - we are unfortunately seeing them unfold EVERY WEEK.

These "bad guys" are really smart criminals trying to coerce your team members in to giving up credentials, access, data, or worse - company funds.