How to spot a business email compromise scam

Business email compromise (BEC) scams are on the rise. They target business owners and high-level employees in order to defraud a company, its customers, or its partners. In this type of scam, an attacker will pretend to be a trusted entity by spoofing a company email account. Then, they trick employees into revealing sensitive information or performing wire transfers. Types of BEC Scams There are different types of BEC scams. However, all these threats usually target employees with access to company finances, in an attempt to trick them into transferring money or revealing sensitive data. BEC scams include: false invoice…

READ MORE

7 bizarre security analogies about preventing ransomware hacks

7 bizarre security analogies about preventing ransomware hacks. Ransomware is the worst. Attacks grew 250 percent last year, and 26.2 percent of those targets were businesses. Even worse, one in six businesses that paid the ransom still didn’t get their data back. WannaCry alone affected over 400,000 machines, and let’s not even get started about ExPetr—the wipervirus formerly known as Petya—or October’s Bad Rabbit. And even though you’ve already implemented as many “new” and “innovative” strategies as you can, you still can’t sleep at night. First, the good news: Some script kiddies are switching to cryptocurrency mining. Fewer new strains were discovered last year than expected, and…

READ MORE

What NOT to do after a data breach

What NOT to do after a data breach Breathe deep, reduce anxiety, and avoid these 9 things It’s an IT department’s worst nightmare: Your business has been hacked by a third party that has accessed your sensitive, confidential data. And often, by the time you discover it, a breach is well underway: US companies take an average of 221 days to detect a breach, according to a 2018 study. So what do you do? Well, it turns out that knowing what not to do is just as important—because, even with the best of intentions, your team could accidentally make the…

READ MORE

Ten ways to keep your data private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. This is good for productivity and progress, but it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. There’s no assuming your phone and the information it stores is safe from the malicious intentions of the human mind. Remember, the first line of defense in protecting your data is you. Learn about new threats, stay…

READ MORE

Survey reveals customers crave digital experiences

More than ever before, customers want to interact digitally with businesses in the same way as they do with friends and family; through social media and mobile devices. These insights are revealed through a recent Microsoft survey of over 1,000 U.S. consumers that uncovered shifts in the ways customers want to hear from businesses. Given that the ability to acquire and retain customers is perhaps the single most important factor for small business success, it’s critical that business owners can deliver on these digital experiences. Below are key ideas to keep in mind when implementing digital experiences into your business….

READ MORE

How do firewalls prevent computer viruses?

You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber criminals. But that doesn’t mean you know how a firewall actually works, does it? Don’t worry—the truth is that most people don’t how a firewall works; they just expect it to do its job. But it’s actually a lot simpler than you might think. Once you learn a little more about firewalls, you might feel more confident about installing one on your home computer, if you haven’t already. If you’re already using a firewall to prevent cyber attacks, perhaps learning more about how it works…

READ MORE

Is password security awareness dead?

Is there ever a bad time to talk about password security awareness? With the discovery of GoldBrute and its penchant for forcing its way into some 1.5 million RDP servers, we think not. Are RDP servers not a concern for you? Perhaps the five million attempts to hack into an IP cam near you will pique your interest. Creating a strong password can protect you from more digital heartache than just about any other single security measure. This fact naturally leads to two important questions: What makes a password insecure? How can you use that knowledge to make a resilient password? What’s in a…

READ MORE

The wild world of 3D printing

As you may have heard, 3D printers are going beyond the simple plastic creations we’re already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in health care, city planning and space travel. Oh, and now you can print sneakers and pizza, too. Here’s a roundup of the latest and greatest developments in the 3D printing world. Medical treatments A variety of 3D printing techniques are being used to create more customized medical care and treatment plans for patients. The FDA has approved the first 3D-printed drug: Spiritam, which controls seizures brought on by…

READ MORE

See ya later, passwords

Google has announced that by the end of this year they plan to replace digital passwords with biometrics. Their “Trust API” will monitor things like location, typing patterns, speed and voice patterns, facial recognition, and more. “We have a phone, and these phones have all these sensors in them. Why couldn’t it just know who I was, so I don’t need a password? I should just be able to work,” Dan Kaufman, head of ATAP at Google, said at the company’s I/O conference in May.1 It’s something consumers are clamoring for. According to new research, 80% of users who are…

READ MORE

Five Strategies for Winning at Working Solo

Eighty percent of all U.S. small businesses have no employees. The number of non-employee businesses is expected to grow in coming years, due in part to the expansion of the gig economy. Eighty percent of all U.S. small businesses have no employees. The number of non-employee businesses is expected to grow in coming years, due in part to the expansion of the gig economy (e.g., Uber, TaskRabbit, Thumbtack) and favorable economic conditions. Being in business with no employees means you don’t have to deal with payroll, minimum wage rules, and other employer-related responsibilities. But it doesn’t mean you are relieved of…

READ MORE