BEC or Business Email Compromise is a type of phishing scam where the target of the scam receives an email purporting to be someone they know, like a vendor they work with or a colleague. These scams are so common place that the Federal Bureau of Investigation even has a guide to protecting yourself from them.
BEC Scams are becoming increasingly more common, and the payouts more lucrative
Windows Server 2012 R2 End of Life is just a couple months away, are you ready?
Windows Server 2012 and Windows Server 2012 R2 are quickly approaching their End-of-Life date of October 10, 2023. This is just over 2 short months away and in the world of data migration (especially as it relates to servers) that doesn’t give you a lot of time if you’re still using this operating system in your business.
Zero-click exploits, how they work and how to avoid them
Zero trust or zero effort, how does your businesses security stack measure up?
Have you been working on strengthening your cyber security stack in your business or crossing your fingers and hoping for the best? How much protection is really enough?
There are a lot of remedies for improving cyber security out there, but which ones present the best value for your business, and what constitutes a “zero trust” environment?
If you’re just starting out, these 10 items will greatly improve your business’s cyber security safety in a short amount of time (we call these “best practices”):
Use multi-factor authentication.
Threads, Twitter, or neither? What are the differences and what are the benefits of engaging on social media for your business
News about the Twitter rival, Threads, exploded last week as 100 million people signed up so far just as Twitters traffic plummeted from recent changes.
Twitter announces that the number of tweets that users could view would go from infinite to a set amount depending on the type of account you have.
The US has declared a $10 million dollar bounty for more information on this ransomware
The US State Department’s “Rewards for Justice” program announced a 10 million dollar bounty for any information leading to clues on how the Clop ransomware attacks are linked to attacks on foreign governments.
Announced via Twitter, the Rewards for Justice account tweeted "Do you have info linking CL0P Ransomware Gang or any other malicious cyber actors targeting U.S. critical infrastructure to a foreign government? Send us a tip.
California retiree’s pensions possibly in limbo after data breach targets the nation’s biggest pension funds
News just broke yesterday that a data breach targeting the nation’s biggest pension funds CalPERS (California Public Employees' Retirement System) and CalSTRS (California State Teachers' Retirement System) lead to the release of identity information on more than 1.1 million of their members collectively.
Keep running out of disk space? Here are our solutions.
Have you been getting a low disk space error on your Windows device? This means your computer is out of space to download new files or even apply crucial updates. There are some obvious solutions to the problem and not some not obvious solutions that will help you solve the problem in the long term.
Need a new work laptop? Here are five features to focus on
AWS vs Azure, what is your best option when choosing a cloud platform?
We’ve had articles in the past about why you should consider making the move from on-premises to the cloud, but we’ve never specifically addressed which provider you should consider when making this move.
For many, AWS (Amazon Web Services) and Azure are the main players that they look to when making the jump the cloud.