Blog

Blog

Holy Cyberattack Batman! What Is EternalBlue And Are Your Devices Still Vulnerable?

Baltimore -- as in the entire city, has been dealing with the ramifications of a cyberattack that froze thousands of computers, brought emails to a halt, and stopped many city services from functioning properly.

Read More »

There's A Hacker At The Airport Who Wants To Steal Your Data

It's a common traveling scenario: you get off the plane and walk into the airport. With time to kill before your connecting flight, you think you'll get caught up on emails and calls you missed while in the air. The only issue is your phone or laptop's battery is in the red. Conveniently, there's an airport charging station right in front of you and the empty usb ports are calling. You dig out your device cord and connect...walking right into a hacker's trap.

Read More »

Homeland Security Recommends These Office 365 Practices To Avoid Getting Hacked

When it comes to the relentless amount of cyberattacks going on right now, the goal for any business is to minimize risk and avoid being a target.

Read More »

What 3 Recent Breaches Can Teach Us

It's scary that large data breaches are becoming a weekly occurence. A recent report by Malwarebytes found that cyber threats are up 235% year-over-year!

Read More »

Watch Out for These New Office 365 Phishing Attacks

We always see an increase in phishing attacks right before tax season and into travel-heavy summer. This year is no different.

Read More »

Meet the Man Whose Phishing Scam Robbed Google and Facebook of Millions

His name is Evaldas Rimasauskas and he's a 50-year old man from Lithuania. Last Wednesday, he pled guilty to a phishing scam that fooled tech giants Google and Facebook into giving him millions over the course of two years. 

Read More »

Watch Out for This Nasty Spoofed Blackmail Attack

Every day our cybersecurity team investigates and fights against a wide variety of phishing emails and spoofing attacks.

Read More »

I Watched a Real Hacker in Action and Here's What I Learned.

Okay, quick disclaimer, no crime was committed here. This person agreed to demonstrate how hackers operate as part of a service to keep business owners informed about the type of threats that are out there. This type of attack is happening to someone right now, every day of the week.

Read More »

Laptops, Tablets, and Smartphones All Create Attack Paths to Your Network - Here's How Endpoint Security Blocks Them.

Remote Devices Provide a Weak Link for Hackers to Exploit


The internet of things (IoT) and office policies of "bring your own device" BYOD, have created network vulnerabilities like never before.

Read More »

60,000 New Emails! What to Do If You Get Subscription Bombed-Part 2

This is Part 2 in a Blog Series About Email Subscription Bombs, Read Part 1 Here.

Email Security Best Practices

While every type of attack can't be stopped, it is crucial to make email safety a priority.

Read More »
   
New Call-to-action

Posts by Topic

see all