Network Security Threats: Data Breaches Up 29 Percent Over Last Year

Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout.  Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did…

Read More

Essential Network Security Tips: Provide Your Employees With Critical Network Security Training

Network Infiltration and Data Breaches are normally blamed on the malicious outsider.  However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity.  When you provide routine training as a preventative, not reactive,…

Read More

Fraud Detection: Identifying Tech Support Scams

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by…

Read More

Why is Cybersecurity Important? Half of SMBs Suffered Data Breaches In the Past Year.

A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies’ security required…

Read More

What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked

Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It’s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to…

Read More