cybersecurity

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]

Red Level Expands Grand Rapids Datacenter Presence

Sometimes, important changes happen without anyone noticing. That was the case recently as Red Level greatly expanded our West Michigan datacenter footprint. We’ve been watching closely as the Grand Rapids-area market has grown and changed in recent years. Grand Rapids has been emerging as a powerful new hub for information technology-focused companies, both in the form of innovative start-ups and as a destination of choice for established companies looking to expand into a new market or relocate their operations. At the same time, a lot of the area’s established businesses have been embracing cloud-based solutions as a means of building their capabilities and modernizing their IT operations. Naturally, as the markets we serve and our clients’ needs grow, we need [...]

Email Phishing Becomes A Bigger & Bigger Threat

Phishing threat is no joke, despite the widows and princes. The phishermen are out there – just make sure you don’t get caught. Imagine: You come into work one morning and open a typical, innocuous-looking email. Unknown to you, that sets in motion a chain of events: Malicious code within the virus embeds itself within your laptop, forcing it to perform a series of hidden procedures that open gateways to your data, send spam emails to your contacts, and reproduce copies of the code. By lunchtime, several of your colleagues’ machines are doing the same thing. Twenty hours later, your entire network is infected, and all 70 employees are idled for two days! Can it happen? It happened recently to [...]