Upcoming Webinar: Cyber Fortress – Data Protection For Your Business

  • September 20, 2018

Data protection webinarPlease Join Us For Our October 16, 2018 Webinar!

Title: Cyber Fortress: How To Protect Your Data Empire
Date and Time: TUESDAY, October 16, 2018 1:00 PM – 2:00 PM EDT
Presenter: Patrick DeAngelis, Data Protection Expert, Datto Inc.
Moderator: Eric Hobbs, CEO of Technology Associates

Data Protection In Your Business

The holidays are almost here, and you can probably already feel the excitement stirring. Before you run out of the office to celebrate with family and friends, make certain you’ve put smart measures in place to protect your business this holiday season.
This is the time of year when the hustle and bustle of the workplace go quiet, as many companies close their doors and head home to celebrate the holiday season with family and friends.

Protect Your Business This Holiday Season

Unfortunately, the holidays are a prime target for criminals to hack and steal from businesses who are out of office. You won’t want to miss this insightful discussion around data protection and disaster recovery, featuring Patrick DeAngelis, Data protection expert of Datto, Inc. to ensure you’ve got the right protection in place before you head home for the holidays.
Read More

Nigerian Prince Alert! CEO Fraud: Phishing Email Scams Targeting CEOs

  • September 11, 2018

CEO Fraud Phishing Email ScamPhishing Email Scams Targeting CEOs: You’re Smarter Than A Nigerian Prince, Right?

Before you say you’ll never be one of those people who gets suckered into giving money to a Nigerian prince, just know that, a sophisticated version of this phishing email scam took tech giants, Google and Facebook, for over $100 million.

Yes. Google, a seller of security keys marketed as “the strongest, most phishing-resistant authentication factor for high-value users” and Facebook, a survivor of 600,000 cyber attacks every day, gave money to a Nigerian prince.

In this case, to a 40-something Lithuanian man named Evaldas Rimasauskas, who ran a sophisticated CEO fraud scheme, which involved him impersonating a large computer parts manufacturer using fake email addresses, forged corporates stamps, and phony invoices.

It took two years before anyone even discovered that they were being conned.

Read More

Sharks In The Water! PhishPoint: Phishing Scam Attack Of The Week On Office 365 Users

  • August 28, 2018

Phishing Attack PhishPointHopefully you and yours are staying out of the Sharky waters lately (especially in Cape Cod and Texas!) Our topic today are the sharks in our digital waters this week. The latest Microsoft phishing attack, dubbed “PhishPoint,” demonstrates the lengthy extents in which cybercriminals will go to obtain confidential information. If you’re new to following our content or are just learning about Phishing Scams, check out our resources on phishing scams for business owners at the bottom of this page. In the most recent PhishPoint security breach, these hackers were able to use Microsoft’s Online platform to gain this information from users. Here’s what happened and most importantly, here’s how you can protect this from happening to you, your employees or your clients if you’re an Office 365 User.

Read More

Ransomware Attacks Becoming More Sophisticated

  • August 23, 2018

Ransomware Attacks Showing Increased SophisticationRansomware Attacks Becoming More Sophisticated

You’ve seen articles on LinkedIn, maybe seen one while scrolling your social media news feed, and most of us think ransomware strictly amounts to email scams like phishing. In this article we’re addressing some of the major types of ransomware attacks, how they’re growing in complexity and demand, and how you can protect yourself from these increasingly clever ransomware attacks.

Read More

Bandwidth Snatchers…Modern Day Wifi Pirates: Who Are They And How Can You Protect Yourself?

  • July 10, 2018

How To Tell If Someone Is Hacking Your WifiWe’ve all seen the cheesy identity theft commercials with the guy in the black tracksuit (or in this case, an intimidating cable knit sweater!)– ski mask on, mischievously peering over a keyboard like he’s about to steal some family jewels, but what about these bandwidth snatchers? What does that even mean, what do they want, and how do you protect yourself from these modern day Wi-Fi pirates?

Read More

5 Overlooked Security Considerations For Remote Workers

  • May 31, 2018

There’s never been more freedom and autonomy in the workforce than today. However, with all this freedom comes great responsibility and security tops the list when working remotely.

Hackers love easy targets and when you extend the corporate network by working remotely or taking work devices into public spaces you are unknowingly inviting someone to take a peek.

Read More

What Breach? The Details You Need From The 2017 North Carolina Security Breach Report

  • February 13, 2018

More than 1,000 data breaches were reported to the North Carolina Department of Justice in 2017. Since 2005—when North Carolina law began requiring businesses, state governments and local governments to report security breaches—there have been nearly 5,000 breaches reported. And those breaches, have impacted more than 14 million residents that call North Carolina home.

Read More