Botnets: Are YOU Part of this Painful Digital Threat?

Botnets have been around since 2004 when the first one was discovered and branded Bagle. The worm was designed to inundate Windows computers with spam, and it was a prototype — an infant form of what botnets would one day become. Your I.T. security team probably wouldn’t see Bagle as much of a threat these … Read more

Malvertising: How to Avoid Tempting Scams

Malvertising is a term used to describe the practice of using malicious online ads to infect users with malware. Malicious actors can use these ads to spread viruses, spyware, and other types of malware to unsuspecting users, often through legitimate websites. One of the facets of surfing the Web is ads that appear on the … Read more

How to Keep Information Private During Video Calls

If you’re like the majority of Americans, you probably work from home at least some of the week. These days, you may not come into the office at all. In fact, more than 58% of the country’s workforce currently has a hybrid (trades off days in the office and at home) or fully remote (works only from home) schedule. If it’s … Read more

Hackers Target the Detained More Than You Think

They say “don’t do the crime if you can’t do the time,” but what happens when cybercriminals decide to commit their own version of double jeopardy? Instead of sentencing convicts to twice the jail time, though, hackers often target people who are incarcerated and steal their identities. In fact, a recent cyberattack on a healthcare … Read more

Beware of Webcam Hacking

Webcam hacking is a type of cyber attack where a hacker gains unauthorized access to a person’s webcam and records their activity without their knowledge. These attacks can be used to steal personal information, record sensitive conversations, and even blackmail victims. We’ve all seen it on TV: Cops processing a scene, while to their ignorance … Read more

What Are Phishers Most Popular Common Brands Faked?

Phishing scams are rampant in today’s cyber environment. Over 90% of data breaches start with a well-placed phishing message. Phishers will set “bait” to draw you into you installing malware or giving them your private information, without having to break in through more time-consuming and convoluted methods. Cybercriminals are only getting smarter with their manipulation, too. New … Read more

5 Things Your I.T. Guy Says, Decoded

Whether we’re backed by a whole department of security experts, relying on chat support to troubleshoot a one-off issue, or contracting a team to mitigate an existing threat, we’ve all had to call upon tech support at one point or another. Too often, we’re then inundated with confusing technology jargon that’s hard to keep up … Read more

Should I Delete My Old Apps and Programs?

If you combed through your computer, you would probably find a lot of programs that you don’t even remember downloading. Thumb through your phone, you’ll see apps you haven’t touched in a very long time. It can be frustrating to take time out of your day to search out old programs and wait for them … Read more

Cyber Insurance FAQ’s

A cyber risk refers to the risk of financial harm that is done to an organization and is a result of a failure or disruption of its computer systems. It may also be a risk that a company faces from the way they handle their data or rely on technology in their everyday operations. But … Read more

Samsung Announces Data Breach: What Happened to YOUR Info?

Over Labor Day weekend, Samsung users in the U.S. received an unfortunate email from their provider: “In late July 2022, an unauthorized third party acquired information from some of Samsung’s U.S. systems. On or around August 4, 2022, we determined through our ongoing investigation that personal information of certain customers was affected. We have taken … Read more