The IT Pro Blog
We actually write these blogs. Yes, you read that right. Our team of IT pros compile knowledge from the job and years of experience, combined with real-time updates of what we see in the field, to bring you value-add content on a weekly basis.
The 3 Most Common Phishing Techniques Used to Attack Your PC
When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed billions of emails
Beware of COVID Vaccine Scams Online, Over Text and By Email
Social distancing, masking, herd immunity…these are words that have become commonplace this year as the world has endured the COVID-19 global pandemic. In December, we
The Most Vulnerable Departments and Sectors to Phishing Attacks: Is Yours on the List?
With all this talk of increased cybersecurity measures and vulnerability to phishing attacks, you may be wondering: what are the most vulnerable departments and sectors
Email Threads Are Being Used Maliciously in Automated Attacks
Beware: if you’re infected by the QBot Trojan, it’s possible to have your email threads (the chain of back and forth emails in any given
Cybersecurity Trend: Lateral Phishing
In this blog, we’ll be highlighting an emerging threat known as lateral phishing. While account takeover has been one of the most common and fastest
Is AI Voice Phishing the Next Big Security Threat to Small Businesses?
We’ve all heard the term Artificial Intelligence (AI) and in many ways it refers to futuristic possibilities: innovation and an exciting future of artificial intelligence.
10 Shocking Phishing Facts
Are you doing enough to protect your business and yourself from phishing attacks? If you think you aren’t likely to be a victim, we recommend
Watch Out for Domain Listing and Website Listing Service Scams!
PSA: Several of our clients have sent over the following “Website Listing Service” letters that have been mailed to them. EXAMPLE: These are a scam.
Is it a phishing attempt? Ask these two questions.
If you’re not already, it’s time to become aware of the risk of phishing attempts within your business. If you think you’ve figured out all