mobile security

Top 5 Infrastructure Trends for 2019

We’ve bid 2018 farewell and welcomed 2019 with open arms. So what's next? What’s going to happen in 2019 from an infrastructure perspective? The answer for 2019 is similar to that of recent years. Cloud and security are still the top priorities. Let’s take a quick look at what may impact your infrastructure focus. 1. Exchange Migration Migrations from Exchange on-premises to Exchange online and upgrades from older versions of Exchange to the latest version are both projects going strong in 2019. We continue to support our clients who are going through these Exchange migration and upgrade processes and predict that Exchange migrations, upgrades, and support will continue to be a trend with our clients. 2. Multi-Factor Authentication To add additional security, Multi-Factor Authentication (MFA) provides one or more additional forms of authentication for users when they log into company resources. Traditionally, users would log into their computers or other ...

2023-02-16T16:01:29+00:00

What is spear phishing and how can my company avoid it?

The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped. [1] What is Spear Phishing?  Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the recipient into installing malware on their computer or network. Here is how it works:  1. You receive an email with an attachment from what looks like it originated from a ...

2023-02-16T16:01:31+00:00

Scams Target Travelers and Hotels

Every summer it seems that there is another scam targeting travelers. Check out this blog from one of our partners, KnowBe4, on the latest fake hotel website scam. "Cybercriminals will take advantage of any situation that separates people from their money. And what better way than to purport to be a reputable hotel and take reservations? The recent example in Turkey covered below demonstrates how far cybercriminals are willing to go to setup their scam. In this newest scam, fake hotel websites are setup (in some cases even copying a hotels entire website!) using as many as 50 domain names similar to the hotel’s brand name. These scammers are so good at what they do, in many cases, their fake websites ranked higher in natural search listings than the real hotel’s website. Travelers book and pay for their travel, and only find out when they show up at the hotel, who has no idea ...

2023-02-16T16:01:36+00:00

WIFI or WI-Spy : Avoiding the Perils of Public Networks

For some reason, it seems to be a well-kept secret that public networks are not exactly secure. Just about anywhere you may go in a given day -  coffee shops, libraries, shopping malls, office buildings, your hotel – there’s a network just waiting for your device to join it. Convenient? Sure. But from a security standpoint, this is not a good thing. Try telling that to a convenience-driven society that’s grown quite used to shopping, checking its email, dating, doing its banking, and chatting on social media, whenever and wherever it wants to. Despite the publicity given to data theft and identity theft, many if not most people don’t change their online behavior on vulnerable public networks, or even take advantage of even basic protective measures. A recent article in Harvard Business Review outlined the range of threats to public wifi users’ security, describing some of the common tricks the ...

2023-02-16T16:01:42+00:00