Our Blog

New Mobile Phone Scams Steal SIMs and Drains Financial Accounts

According to a recent news report, a San Francisco man lost $1 million — 90 percent of his life savings — in a matter of minutes when a hacker took over the victim’s mobile phone. This is just one of thousands of SIM swap scam incidents,…

Cryptojacking Attacks Spike as Hackers Prioritize ROI

Although cryptocurrency is somewhat of a mystery to the general public, large sums of money are changing hands through cryptocurrency transactions. However, people can also profit by mining cryptocurrency, verifying and authorizing transactions,…

Physical Security Plays an Important Role in Protecting Sensitive Data

Physical security is often an afterthought when it comes to protecting IT assets and data. However, theft and unauthorized access of computer hardware happens all too frequently, and the threat is increasing as devices become more portable. Mainframe…

How IT Standardization Reduces Complexity, Cost and Risk

An employee requests a new app, a new device, or a quick configuration change to help them complete certain tasks or projects. Maybe they want a Mac even though all employees have Windows machines. Hoping to keep the employee happy, IT comes…

Why Sloppy Password Practices Are the Main Ingredient in Credential Stuffing Attacks

Citrix. Dunkin Donuts. Reddit. AdGuard. Nest. TurboTax. These are just a few of the major brands that have been compromised in credential stuffing attacks in the past few months. These attacks show no signs of slowing down, according to Akamai’s…

Remote Work Security Challenges and How to Overcome Them

In a recent report from Buffer, 99 percent of survey respondents said they would like to work remotely at least part of the time for the rest of their careers. People like to have the flexibility to work from home if a child is sick or there’s…

Managed Services Enable Employees to Focus on Meaningful Work

Take note, bosses: What American office workers really want is more meaningful work and less time spent on mundane tasks that sap time, energy and productivity. In a recent survey conducted by ServiceNow, 61 percent of workers said they would…

Is Your Social Media Activity Putting You and Your Employer at Risk?

Social media can be a blessing when you use it responsibly and a curse when you don’t. On the positive side, social media allows you to build and maintain relationships, both personal and professional. On the negative side, social media can…

How Steganography Helps Hackers Hide Attacks

Remember using invisible ink as a kid to share top secret messages with your friends? Apparently, hackers remember, too, and they’re using a similar technique to hide malware. The recent VeryMal malvertising campaign, which popped up in major…

The Clock is Ticking for Windows 7 Users

Although it is only months away from essentially becoming dead technology, the Windows 7 desktop operating system remains remarkably popular. In fact, usage actually increased slightly in January. The risks associated with it are also increasing,…