Business email compromise (BEC) attacks are becoming widespread and present a significant risk to businesses of all sizes. These attacks involve hackers posing as trusted...
Blog Posts
New Phishing Scheme Using Fake Copyright Infringement Notices
A new phishing campaign targeting Facebook users has been identified by cybersecurity firm Trustwave. In this campaign, hackers use fake copyright infringement notices to trick...
LastPass Security Breach: Encrypted Passwords at Risk
LastPass, a popular password manager, announced that an unauthorized party accessed the company's archived backups of its production data on a third-party cloud-based storage...
DraftKings Data Breach Exposes Personal Information of 68,000 Customers
In late November 2022, sports betting firm DraftKings announced that it had suffered a data breach affecting approximately 68,000 customers. The company stated that the breach...
Better Education Using Webinars
For the majority of organizations, traveling to a conference may be time-consuming, expensive, and challenging. Then there's the trip, the time away from the workplace, and the...
Risks of Public Wifi
While public Wi-Fi can be a convenient way to stay connected while traveling, it is important to be aware of its potential security risks. If a hacker intercepts your data while...
FBI Program Tasked with Infrastructure Security Compromised
The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was...
Streamline Your Business with the Latest Smart Home Technology
Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the...
Data Breach at Sequoia One Exposes Sensitive Customer Information
What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they...
Cisco Reports Critical IP Phone Vulnerability
As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability,...
Google Chrome Releases Two New Features
Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can...
Last Microsoft Edge Update for 2022
A new version of Microsoft Edge is available for Windows, macOS, and Linux. While the update is relatively small, it contains two feature upgrades and significant security fixes,...