Blog

Blog

How Cybercriminals Use Your Sense of Urgency Against You

Picture this scenario: A low to mid-level employee gets an email from the CEO. He needs the lower level employee to wire him money right away and provides wire transfer information. An important client is upset, and they need this money to keep the client satisfied. Or the CEO is traveling, his wallet was stolen, and he needs money to be able to get a flight home.

The lower-level employee, not wanting to disappoint their superiors or their clients, comply and wire the money quickly, and without question. Except it’s not the CEO. It’s a cybercriminal, this was a phishing attack, and now the company is out thousands of dollars.

This scenario plays out all the time in businesses all over the world. Phishing attacks like these prey on your sense of urgency to scam you out of thousands of dollars.

Read More »

How to Prevent Common Mistakes in Outlook

If you’re a human, you’ve probably had at least one embarrassing moment in your career involving email. Maybe it was an awkward typo, or you called someone by the wrong name. Or you missed an email from a prominent client or your boss.

If you’re using Outlook for email, though, there are a few features and add-ins you can use to help check yourself – or at least give yourself a little extra time to catch your mistakes. 

Read More »

Why Punishment Shouldn’t Be Part of Your Cybersecurity Plan

Picture this: One of your employees downloaded a malicious attachment from an email, and now some of your company’s files are encrypted. Your company has fallen victim to a ransomware attack. What do you do with the employee? If your answer involves punishing the employee, you need to think again, or you could be setting your company up for more attacks in the future.

One of the absolute worst things you can do for your company’s data security is punish employees for falling victim to a cyber attack. Let us repeat that: do not punish your employees for falling victim to a data breach.

Read More »

The Pros and Cons of Microsoft 365

Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.

But like everything else, it has its pros and cons and won’t be the right solution for every business.

 

Read More »

Four Types of Phishing Emails Targeting Businesses

Phishing emails can be a big problem for businesses of every size. They can be difficult to detect and prevent and can cost you big time.

One of the reasons they’re so difficult to detect is because they can take on so many forms. A phishing email can look like anything. But there are patterns and some common types to be aware of:

 

Read More »

What is Shadow IT?

 

There’s probably a massive hole in your cybersecurity. It’s probably been there for years. You probably already know about it – you may even be the main culprit behind it. And you probably don’t even realize it’s a security risk: Shadow IT.

Shadow IT refers to the use of any hardware or software in a company that is not approved by the IT department. Examples include: employees using different software to edit photos, storing company files on their personal flash drives, or simply using a different internet browser to check their email.

Read More »

FAQ: Is Office 365 Secure?

One common question among businesses considering Office 365 is “Is it secure?” This is a great question to ask of any software, app, or company with access to your data (and should probably be asked more than it already is). The short answer is yes*, but a lot of the security is your responsibility.

Read More »

Ignite 2017: What you need to know

A few members of our service team spent last week at Microsoft Ignite, the annual conference for IT admins, engineers, computer scientists and other technical folks. Most every Microsoft conference includes major product announcements, and Ignite 2017 was no exception.

Most focused on the tech side (hello, quantum computing), but there were also some product announcements that will likely affect the day to day of every employee – not just IT admins.

Here’s what you need to know:

Read More »

Watch Out for this Fake Office 365 Spam Message

Microsoft recently released Volume 22 of their Security Intelligence Report where they reported a pretty scary number: They’ve seen a 300% increase in user accounts attacked over the past year. After poor password management, one of the main causes of this is targeted phishing attempts.

Cyber criminals target potential victims based on industry, job role, and more recently, the apps and software they use. Office 365 is no exception. Recently, we were forwarded a phishing attempt targeting Office 365 made to look like a generic spam quarantine message. To the phisher’s credit, they made this attempt look very, very convincing.

Read More »

Five Fast Facts about Microsoft 365

Microsoft recently introduced a new product called Microsoft 365, centered around making business more productive and more secure. While it’s not going to be for every business, it’s a natural fit for many businesses – especially if you’re already using (or looking to move to) Office 365 or Windows 10.

Here’s what you need to know:

Read More »
   

Subscribe to Our Newsletter

Ultimate Guide to Small Business Cyber Security