Blogs
The Power of Social Engineering: Common Techniques Used to Target Victims
Everyday, we’re being socially engineered – whether we realize it or not. Social engineering is a subliminal, psychological scheme that targets human weakness, making most of us vulnerable to these clever hacking techniques. From spam phishing emails to celebrity deep...
Is Bluetooth & BLE Safe? | Security Vulnerabilities + Tips
Bluetooth has become a colossal part of our lives since its inception. Invented in 1994, it was the same year that the “world wide web” was born (this refers to actual web pages and not just the general internet). Bluetooth has made phone calls easier, inspired a...
Basic WiFi Isn’t Enough—Why You Need Business Internet
Consider every possible moment that your business relies on an internet connection each and every day. Every business, small or large, needs access to good, reliable and secure internet. That means your plan must offer the right bandwidth, speed and security features...
Google Workspace | The Only Secure Email Server Your Biz Needs
You want to make sure all online business interactions are secure. Email is one of the most common ways that employees communicate with colleagues and individuals who work outside of their organization. The information you put in emails is likely confidential, at...
Why Legacy Software Is a Security Risk
Having new software and technology is one of the best ways to keep your organization up-to–date and secure. It can help to alleviate problems within your network, as well as better protect systems from hackers. With up-to-date software, your organization can continue...
Amazon Ring & IoT Security Vulnerabilities To Know About
The Internet of Things – IoT – has changed the way that we connect to the rest of the online world. These devices can communicate with the internet to simplify tasks, like changing the temperature on your thermostat or playing a certain song. Many homes and businesses...
What’s a VoIP Call Center?
VoIP phone systems (Voice over Internet Protocol) are the new way to go when it comes to business communications. VoIP uses the internet to make and receive calls, rather than traditional landlines like a normal telephone. What makes VoIP so great? Well, VoIP offers a...
Why Security Keys Are Better for 2FA
How Do We Know Security Keys Are Worthwhile? The value of security keys has been thoroughly examined by one of the most tech-obsessed, and industry-dominating, tech companies: Google. What they learned was this: Security keys are the #1 absolute, best form of...
How Business Email Compromise Works | Prevent and Protect
According to data compiled by the FBI, business email compromise (BEC) is one of the most damaging cyber crimes. All businesses rely on email to communicate, making almost any employee or client vulnerable to some level of compromise, which could be devastating...
Can AI make malware? It sure can.
Believe it or not, the history of artificial intelligence (AI) started in the 1950’s. Now 70+ years later and it’s grown in popularity and potential. Artificial intelligence enables computer systems to think and act like people. AI now has the potential to make...
What You Should Know About Spam Text Messages
By Mary Grlic “Spam” is defined as uninvited and insignificant virtual messages that have been sent to a mass number of recipients. If you have an email address or a cell phone, you’re no stranger to spam. You've definitely received some sort of spam text message(s)...
Stolen iPhone + Passcode = Easy Peasy Identity Theft Recipe
Does a Passcode (PIN) Really Protect your Phone in Public? Everyone puts a passcode (PIN) on their cell phone to keep their information safe (well, we hope 😅) but is it really all that secure? The Wall Street Journal recently reported about an iPhone crime wave that...
90’s Movie Office Space Goes Reality
In late December 2022, a software engineer in Seattle, Washington, was charged with stealing more than $300,000 from his former employer, Zulily. Ermenildo Valdez Castro, 28, allegedly adjusted prices of Zulily’s products and changed company code in order to “divert...
The Guardian Hit by Ransomware Attack
In mid-January 2023, The Guardian newspaper confirmed that it was hit by a ransomware attack back in December 2022. Hackers exploited the data of some UK-based employees. It also inhibited some of the functions of the media group. It was difficult for employees to...
All About Network Cables and Wiring for Your Small Business
By Mary Grlic Cables and wires are the highway for your data and communication. A good wiring system allows for a high speed internet connection, organization, and optimal internet safety. With a well-designed and well-managed networking system, you can be sure that...
Accounting IT and Cybersecurity
By Mary Grlic Protecting your IT is important for just about every industry. When dealing with finances, however, it becomes even more critical. Accounting information technology is growing in importance and requires a lot of attention to ensure total network...
Transportation Cybersecurity: Keeping Critical Infrastructure Safe
By Mary Grlic Transportation is critical infrastructure that helps us move goods and people safely, quickly, and securely. We rely on a lot of forms of transportation in today’s day and age, like boats, trucks, trains, cars, and planes. Even if we don't think about...
Malvertising Is Trendy Again; Meet the Rhadamanthys Stealer
Cybercriminals’ Latest Illusion There’s a relatively new cyberattack technique that you should be cognizant of. "Malvertising" (malicious advertising) injects malicious code into digital ads. The most disturbing aspect of malvertising is that, in some cases, you may...
2 Key Features of VoIP for all Small Businesses
By Mary Grlic Voice over internet protocol (VoIP) phone systems are a must have for any business. They offer so many features that allow companies to improve their productivity, make calls from anywhere, and stay connected with their customers. VoIP offers a lot of...
Fire Suppression for your Server Room
Keep your server room safe with the right type of fire suppression methods. Your company’s servers are one of the most important parts of your IT infrastructure. A server hosts and protects data within a network. Servers are expensive pieces of equipment. If they face...
VoIP for Nonprofits | Here’s What Nonprofits Need to Know
By Mary Grlic As with any business, having a reliable IT service is an essential for nonprofit organizations. For a lot of nonprofits, having good means of communication is one of the most important parts of operation. This means the right type of phone system for...
JFK Taxi Scheme – Dispatch System Gets Hacked
By Mary Grlic The United States Department of Justice recently announced the arrest of two men for, “conspiring with Russian nationals to hack the taxi dispatch system at JFK airport.” The suspects, Daniel Abayev and Peter Leyman, both from Queens, New York, hacked...
Vulnerability Assessments: A Must for All Businesses
By Mary Grlic Do you fully understand the system vulnerabilities within your business? How do you find ways to mitigate such risks/threats and improve internet safety? What would you do if you found out that a company device or server has been compromised? What steps...
Evolution of Ransomware: The Scary Reality
By Mary Grlic Ransomware has become far more of a threat than ever before for countless companies. As technologies evolve, cyber threats unfortunately become more common. Even newer security methods are sometimes not enough, as hackers could always be one step ahead....