Blog

Stay up to date with the latest technology trends, news, and tips

4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of

Read More »

Beware of these social engineering tactics

The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although business owners may think that their systems are safe from malware, they may not be prepared for social engineering. This strategy can be used to steal personal information from unsuspecting

Read More »

5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites. 1. Multi-factor authentication (MFA) This tool earns the number one spot on

Read More »

What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office,

Read More »

Michigan Cyber Command Center: Cyber Situational Awareness Message (SAM) – Threatening Phishing Emails

The MC3 has become aware of threatening phishing emails circulating recently. Hundreds of variations of the email, all with a very similar template dating back to August 2017, have been found. The emails begin with the adversary claiming to know your “secret”, have your email credentials, contact list, access to your internet search history (i.e. pornographic sites the user has visited), or access to your webcam containing embarrassing footage.

Read More »

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more. Spectre 101 For those who don’t know, Spectre is a vulnerability in

Read More »

Security policies for your business

Businesses rarely address cybersecurity in their company policies. With cybercrimes becoming more prevalent, it’s important you inform staff about the threats they could be exposed to. Make sure your business and employees are safe with these security policies. Internet In today’s business world, employees spend a lot of time on the internet. To ensure they’re

Read More »

The Timehop Security Breach: What you Need to Know

In a Saturday July 7 blog post, social media company Timehop publicly revealed a July 4 security breach that resulted in the personal information of approximately 21 million users being compromised, including names, genders, dates of birth, email addresses, and phone numbers. The attack also temporarily exposed the keys Timehop uses to authorize access to other social media services, though all such keys have since been deauthorized and are thus no longer an active security threat.

Read More »

Assess risks before buying new software

The growing market for cybersecurity products is a sign that businesses are taking the issue seriously. But before your company jumps into investing in any product, ask yourself if it’s really necessary. Find out how you can make the most out of cybersecurity products by conducting a risk assessment. Uncover threats and vulnerabilities Every business

Read More »

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought. Small businesses are especially at risk and need to take action. VPNFilter recap A

Read More »
Archives
Scroll to Top