Sextortion Scam: Aaron Smith, The Latest (Most Embarassing) Cybercrime Hacking Technique

  • November 1, 2018

Sextortion Scam Aaron SmithWhat we all do behind closed doors, is our business, right? This “Aaron Smith” Sextortion Scam suggests otherwise.

Imagine this (or maybe you don’t have to imagine because if you’re a business owner in the triangle area):

You open your inbox, and some guy named Aaron Smith in broken english says something to the effect of,

“Hey, I hacked into your computer while you were on adult website X, I turned on your webcam and recorded you and your screen, and if you don’t pay me $5000, I’m going to post this video on your facebook feed and show your aunt Martha, your boss’s wife and everyone else in your world.

I have your information, I know your password is Rover050467.”

Yep. This latest scam/internet con/email phishing attack is called “Sextortion” because it’s whole tactic is based around threatening to share what you do in private to all of your peers. This one’s a doozie to say the least.

If you’re not signed up yet – attending our next webinar Tuesday November 13 from 1:00 – 2:00 PM on Cybersecurity: How To Protect Yourself And Your Business From Data Breaches is an absolute must. 

Let’s dive into this debacle of a threat so you can learn how to protect yourself from this fantastically embarassing (and clever!) email phishing attack.

 

Read More

Why Managed Services For Law Firms Makes Sense For Cyber Security And Data Protection

  • October 18, 2018

managed services for law firms raleigh NC IT support

As recent cyber incidents targeting CEOs have demonstrated, cyber attacks are now a constant emerging threat for all types of businesses and as a result the demand for managed services for law firms.

Roughly 80% of companies reported experiencing cybersecurity-related incidents last year alone, costing businesses approximately $3.62 million per breach.

What this means for lawyers is being faced with unparalleled data protection difficulties that could influence their ability to practice competently and ethically, and the serious need for managed services for law firms to take on these cyber security liabilities head on.

Read More

Goodbye FuseMail, Hello ProofPoint Anti-Spam Email Software: User-Friendly, Easy Digests

  • October 16, 2018

best anti-spam software for email ProofPoint Anti-Spam Email SoftwareIf you’re an existing client of ours you know we’re always evaluating our internal tools, evaluating what our clients’ experiences and refining our offerings, whether it’s a tool, a software or a service we offer.

As part of our core values, always find a way, when we find something better we’re going to make the change for the benefit of our customers.

We’ve listened to the feedback from our customers; we’re always on the cutting edge of technology offerings and in tune with our industry. Our latest upgrade to ProofPoint Anti-Spam Email Software is going to continue to ensure protection from malware, imposter emails, business email compromise (BEC) in an even easier user-friendly interface.

We’ve brought in, Mike Bodhe, one of our Support Services Engineers Allstars, to answer a few questions around unrolling this new product to our customers.

Read More

Data Recovery Plan For Law Firms: Managed Services Providers Don’t Let Natural Disasters Wipe Out Your Law Firm

  • October 11, 2018

Law Firm Data RecoveryNatural disasters like Hurricane Florence and Hurricae Michael remind us of the importance of building data recovery plan for law firms: managed services providers keep you in business – rain or shine.

October is Cyber-Security awareness month. In lieu of all the recent hurricane activities, in this article we’re diving into data recovery and data disaster planning for law firms. You won’t want to miss our upcoming webinar, Cyber Fortress: Protecting Your Data Empire — check it out here!

From leading the discussion and acting on the demands of an “ever-changing” client base to anticipating new trends in technology to preparing for a natural disaster, many unknowns come with building and growing a law firm. Often overlooked is how to deal the threat of natural disasters like Hurricane Florence and Hurricane Matthew (and whoever else feels like hitting North Carolina this season!) effectively.

Read More

Upcoming Webinar: Cyber Fortress – Data Protection For Your Business

  • September 20, 2018

Data protection webinarJoin Us For Our Webinar!

Title: Cyber Fortress: How To Protect Your Data Empire
Date and Time: TUESDAY, November 13, 2018 1:00 PM – 2:00 PM EDT
Presenter: Michael DePalma, Channel Development Manager, Datto Inc.
Moderator: Eric Hobbs, CEO of Technology Associates

Join us in our next Expertise In Business webinar series on Tuesday, November 13, 2018, from 1:00 PM – 2:00 PM EDT as Michael dives into:
  • How to safeguard your business with a secret weapon in the war on cyber extortion.
  • Simply, securely, and automatically maintain control of your business data.
  • Cyber Security Q&A on how to prevent the biggest threat to the small business community: Ransomware 
  • Real Life Check In: If your systems were struck by a disaster, how much data could you recover? How much downtime would you experience? 
  • Debunking the myths of traditional backup methods and their limitations.
  • Real “out of this world” examples of cyber threats.
  • Proactive Solutions: Business continuity, your new secret weapon in protecting your data empire.
  • How you can protect your business this holiday season.

We hope you can join us in this wonderful conversation. Sign up early to reserve your spot. Wait list positions are limited. Register Here!

Read More

Nigerian Prince Alert! CEO Fraud: Phishing Email Scams Targeting CEOs

  • September 11, 2018

CEO Fraud Phishing Email ScamPhishing Email Scams Targeting CEOs: You’re Smarter Than A Nigerian Prince, Right?

Before you say you’ll never be one of those people who gets suckered into giving money to a Nigerian prince, just know that, a sophisticated version of this phishing email scam took tech giants, Google and Facebook, for over $100 million.

Yes. Google, a seller of security keys marketed as “the strongest, most phishing-resistant authentication factor for high-value users” and Facebook, a survivor of 600,000 cyber attacks every day, gave money to a Nigerian prince.

In this case, to a 40-something Lithuanian man named Evaldas Rimasauskas, who ran a sophisticated CEO fraud scheme, which involved him impersonating a large computer parts manufacturer using fake email addresses, forged corporates stamps, and phony invoices.

It took two years before anyone even discovered that they were being conned.

Read More

Managed Services For Medical Practices: Why You Desperately Need To Hire An MSP Right Now

  • August 30, 2018

managed services for medical practicesIf you’re still on the fence about hiring a managed services provider for your medical practice, just take a moment and imagine this: with managed services for medical practices, your staff would be free liberated in using the latest medical technology, tending to your patients’ needs, all without worrying about if your tools software is up-to-date or if your patients’ medical information are safe from hackers. Managed services for medical practices: here’s why  it’s the best decision you’ll ever make as a healthcare professional and a business owner (and your office administrator will forever be grateful.)

Read More

PhishPoint: Phishing Scam Attack Of The Week On Office 365 Users

  • August 28, 2018

Our topic today are the sharks in our digital waters this week. The latest Microsoft phishing attack, dubbed “PhishPoint,” demonstrates the lengthy extents in which cyber criminals will go to obtain confidential information.

In the most recent PhishPoint security breach, these hackers were able to use Microsoft’s Online platform to gain this information from users.

Here’s what happened and most importantly, here’s how you can protect this from happening to you, your employees or your clients if you’re an Office 365 User.

Read More

Ransomware Attacks Are Becoming More Sophisticated

  • August 23, 2018

Ransomware

You’ve probably seen articles about a recent cyber attack on LinkedIn or while scrolling through your social media news feed, and think that ransomware is limited to email scams like phishing.

But in this article, we’re going to address different types of ransomware attacks, how they’re growing in complexity and demand, and how you can protect yourself from these increasingly clever and potentially business-ending cyber attacks.

Read More

How To Protect Yourself Against Bandwidth Snatchers

  • July 10, 2018

Free WiFiHas your Internet connection suddenly come to a snail’s pace?

You try everything – dump your cache, restart your router, and make a semi-threatening to your Internet provider – but to no avail, videos still buffers at 144p. Then, just as you’re about to give up, your connection mysteriously speeds back up.

Beware. You might have a bandwidth snatcher for a neighbor.

Read More