skip to Main Content

PhishPoint: Phishing Scam Attack Of The Week On Office 365 Users

Our topic today are the sharks in our digital waters this week. The latest Microsoft phishing attack, dubbed “PhishPoint,” demonstrates the lengthy extents in which cyber criminals will go to obtain confidential information.

In the most recent PhishPoint security breach, these hackers were able to use Microsoft’s Online platform to gain this information from users.

Here’s what happened and most importantly, here’s how you can protect this from happening to you, your employees or your clients if you’re an Office 365 User.

Read More

5 Overlooked Security Considerations For Remote Workers

Freelance Worker

There’s never been more freedom and autonomy in the workforce than today. However, with all this freedom comes great responsibility and security tops the list when working remotely.

Hackers love easy targets and when you extend the corporate network by working remotely or taking work devices into public spaces you are unknowingly inviting someone to take a peek.

Read More

Phishing Scams Go Social

With more business being performed online and across social channels, the likelihood of your personal information falling into the hands of cyber criminals, unfortunately, also increases.

Recent reports on cybersecurity confirm that phishing scams alone increased 65% last year and 76% of businesses reported being a victim of a phishing scam last year.

Read More

Managing Your Cyber Risk

The conversation around cybersecurity is here to stay, and organizations must be diligent about evaluating, managing and protecting against cyber threats. When it comes to cybersecurity, the best option is to prepare for the worst, and hope for the best. But how exactly do you prepare for and protect against a cyber threat?

Read More

Act To Strengthen Identity Theft Protections

Social Media For Law Firms And CybersecurityOn January 8, 2018 Attorney General Josh Stein and Representative Jason Saine announced legislation to strengthen protection against identity theft. There are several key items in this legislation that could have a direct impact on businesses here in North Carolina.

Back in February, I wrote a blog post that detailed the need-to-know information regarding North Carolina’s 2017 Security Breach Report. In this original blog post, I reported that more than 1,000 data breaches were reported to the North Carolina Department of Justice in 2017.

Read More

Limit Risk With Secure File Sharing

Sharing Files On Mobile DevicesSecure file sharing is an essential part of keeping your business safe. We’ve always known security is important, but with the increased volume of connected devices and personal devices entering the workplace, it’s faster and easier to share company information. The ease and convenience of accessible data is great, but protective measures still need to be in place surrounding what’s coming in and what’s going out of company walls.

Read More

What You Need To Know About Cloud Security

Cloud technology is where majority of businesses are turning to store their data these days, and it makes sense why. With easier access, lower storage costs and a platform for sharing information globally, there are advantages to be had to moving to the cloud. But we can’t think about cloud technology in a vacuum. If we talk cloud, we’ve also got to talk security too.

As you evaluate cloud deployments for your organization and integrate the technology into your business operations, be sure you’ve considered all aspects of what it means to work in and store data from the cloud.

Read More

Four Tips For A Smarter, More Secure Network

locked_computerYour network connects your business to the outside world, whether that’s partners, customers, stakeholders or prospects. It also stores a majority – if not all – of your company data – public or private.

The data you’ve got stored is the lifeline of your business operations and must be safeguarded. The protection of your data isn’t a nice-to-have, rather it’s a fundamental requirement for organizational health.

Read More

KRACK Goes After Wi-Fi Data Privacy, We Help Protect It

KRACK attacks Wi-Fi privacy. Find out if your business is at risk. There’s a new vulnerability threat and it’s going after Wi-Fi networks. You’ve likely heard of it in the news – KRACK – but here’s your look at everything you need to know about the attack, those who are most vulnerable, the recovery steps underway, and what we are doing right now to protect you and your business.

Read More

New Locky Ransomware Attack Affecting Millions

There is a new Locky variant ransomware attack that is hitting at a steady rate of 2 million attacks an hour. Hackers are using 8,000 different versions of a widespread virus script, according to researchers from Barracuda Networks Inc.

There were 20 million of these attacks within the first 24 hours after it was launched Tuesday morning. The magnitude of this attack is significant – growing rapidly and proving to be highly destructive. The target: businesses or institutional groups in the US and Canada.

Read More
Back To Top