by Roger McClelland | Oct 27, 2020 | Exploit, Threats and Malware, Tips and Tricks |
From our friends at Tips on how to avoid Phishing Attacks It’s important to understand how most attacks are formulated and executed. When we look at social engineering attacks, they pull on emotions. When your users receive a phishing email, it’s never a polite,...
by Roger McClelland | Apr 1, 2020 | Exploit, Threats and Malware, Tips and Tricks |
From our friends at ID Agent: Cybercriminals are already taking advantage of our new digital environment by sending a flurry of phishing messages, fraudulent “official” forms, links to malware-infested websites, and spurious maps meant to compromise personal and...
by Roger McClelland | Sep 4, 2019 | Threats and Malware |
Exploit Sellers Say There are More iPhone Hacks on the Market Than They’ve Ever Seen There are caveats and the sellers are only a slice of the exploit market, but two exploit brokers say they’re seeing more iOS attacks now. By Lorenzo Franceschi-Bicchierai and Joseph...
by Roger McClelland | Aug 29, 2019 | Disaster Preparedness, Tips and Tricks |
Storm Preparations (This post is long, but important) OK, so another big storm is approaching. What are the preparations that you need to undertake in order that you, your family, and your possessions are safe? You need to have your computing device (whether it be a...
by Roger McClelland | Aug 15, 2019 | Managed Services |
Monitoring is the basic building block of Managed Services. It is made possible by a small piece of software, often called an “agent”, which we install on your computer. This agent feeds information about your computer’s health and status back to us. This gives us...