Blog

Blog

The Scary Reality of the Silent Cyberattack

A common saying in the cybersecurity world is “There are two kinds of companies: those that have been breached and those that just don’t know it yet.” The scariest part of this phrase is the “just don’t know it yet.” No breach is good, but at least when you know about it, you can start taking steps to remedy it.

These days, many cybercriminals lie in wait and hide inside of compromised systems, often for months, before making a move.

Read More »

Don't Shortchange Technology in Your Small Business

(This article, written by PTG CEO Reed Wilson, originally appeared in the 2017 GSA Book of Experts)

At PTG, we’ve had the benefit of working with small businesses all over the US. While I don’t have empirical data, my hunch is that those who outperform their peers pay attention to three key areas when it comes to technology in their businesses.

 

 

Read More »

Watch Out for These W2 Phishing Emails

Tax season is starting, and along with it come the tax-related phishing emails. We’ve already started seeing emails this year that look like W2 notifications. Be on the lookout for these, and other tax-related scams.

Read More »

Watch Out for These "Secure Email" Phishing Emails

We typically stick to writing about phishing emails and attacks aimed at businesses, but a recent trend has us making an exception. We’ve seen a HUGE uptick recently in a type of phishing emails targeted at individuals: emails posing as an encrypted email notification. Sometimes, these are pretty generic. Sometimes, they’re much more detailed and look like emails about mortgages or title loans.

The scariest part of this trend? These are convincing – some of the most convincing we’ve ever seen. Most have had very few warning signs that they’re a phishing email.

Read More »

Your New Year’s Resolution: Make Cybersecurity a Habit

Happy 2018! For 40% of Americans, the new year means setting a New Year’s Resolution – have you made one? What about for your business? In 2018, we challenge you to make your (business) New Year’s Resolution to take data security seriously. But not just that – we challenge you to make cybersecurity a habit.

Read More »

Our Top Blog Posts of 2017

 2017 is coming to a close, and we’re counting down our top blogs post of the year. Most of these posts weren’t written in 2017, but continue to be our most popular posts.

Not surprisingly, most of these focus on Office 365. We’re happy to see a security-based blog on here! Cybercriminals often target businesses based on the technology they use and knowing the red flags and warning signs to look out for is a huge step in the right direction towards keeping your business secure.

Read More »

How Cybercriminals Use Your Sense of Urgency Against You

Picture this scenario: A low to mid-level employee gets an email from the CEO. He needs the lower level employee to wire him money right away and provides wire transfer information. An important client is upset, and they need this money to keep the client satisfied. Or the CEO is traveling, his wallet was stolen, and he needs money to be able to get a flight home.

The lower-level employee, not wanting to disappoint their superiors or their clients, comply and wire the money quickly, and without question. Except it’s not the CEO. It’s a cybercriminal, this was a phishing attack, and now the company is out thousands of dollars.

This scenario plays out all the time in businesses all over the world. Phishing attacks like these prey on your sense of urgency to scam you out of thousands of dollars.

Read More »

How to Prevent Common Mistakes in Outlook

If you’re a human, you’ve probably had at least one embarrassing moment in your career involving email. Maybe it was an awkward typo, or you called someone by the wrong name. Or you missed an email from a prominent client or your boss.

If you’re using Outlook for email, though, there are a few features and add-ins you can use to help check yourself – or at least give yourself a little extra time to catch your mistakes. 

Read More »

Why Punishment Shouldn’t Be Part of Your Cybersecurity Plan

Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.

One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.

Read More »

The Pros and Cons of Microsoft 365

Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.

But like everything else, it has its pros and cons and won’t be the right solution for every business.

 

Read More »
   
Ultimate Guide to Small Business Cyber Security