(844) 982-6824 

Hackers you know

Like domestic and child abusers, the “hackers” are likely someone you know

Do you know what’s wrong with these? We’ve all seen these in our Facebook and social media feeds. They seem harmless and ask questions like: Where did you grow up? What’s your favorite color? First pet’s name? Street you grew up on? Favorite food? What’s your high school’s mascot? Favorite band? What elementary school did… Continue Reading Like domestic and child abusers, the “hackers” are likely someone you know

Continue Reading
Spear Phishing Emails

Spear phishing can originate from your website and social media

Spear phishing is a one-to-few or one-to-one kind of attack. Companies and groups with a public directory or staff listing on their websites have probably encountered one of these in the past. A common spear phishing attack works and looks like this: Let’s assume the email address mary.smith@myorg.org looks valid to you and you recognize… Continue Reading Spear phishing can originate from your website and social media

Continue Reading
Spotting email threats

Attachments and spotting malware

The days of sending and receiving viruses—literal virus files designed to spread across your computer—aren’t dead, but for most people it’s unlikely. Most built-in systems are very good at detecting threats. But it is still possible. Here are two file attachments. Which one seems okay to you? The one on the right has a period (.)… Continue Reading Attachments and spotting malware

Continue Reading
Gmail and Hide My Email trick

Use a junk-only forwarder to handle email spam

If you use Gmail or Google-based email (like Google Apps for Business or Education), you can adjust your email address to anything with a + sign. If your email is johnnyappleseed@gmail.com You can write your address in any format or message as johnnyappleseed+lowes@gmail.com. In this example, if you signed up for an account at Lowes… Continue Reading Use a junk-only forwarder to handle email spam

Continue Reading
Password hygiene

How to have good password hygiene

Truth be told, your grandmother’s strategy of writing down all her different passwords on a post-it note might be a better strategy than having one password you use everywhere. At least grandma had multiple passwords! Password hygiene—the act of doing a little upkeep and keeping things neat and tidy—really only requires the use of a… Continue Reading How to have good password hygiene

Continue Reading
Public Wifi and Encryption guide

Understanding public WiFi networks and encryption

When you log on to a public WiFi network, the information between your computer or phone and the network antennas around you is unencrypted. Meaning it’s as freely available in the air to “overhear” as if you were conversing at normal volume to someone a few feet away from you at Starbucks. You wouldn’t loudly… Continue Reading Understanding public WiFi networks and encryption

Continue Reading
Ransom payments by quarter

The state of healthcare and cyber security and threats in 2021

The 10 biggest reported healthcare data breaches of 2021 (by the number of individuals affected) were all hacking/IT incidents, and all but one occurred on the organization’s network server. Ransomware continues to be a threat across the healthcare sector, and the trend is likely to continue in 2022. Continue Reading The state of healthcare and cyber security and threats in 2021

Continue Reading

We've worked with these and dozens of other partners across the U.S.