Super Bowl Ticket Scams to Look Out For
by Nicholas Foisy on January 26, 2024 at 2:04 PM
Super Bowl ticket scams have increasingly become a prevalent issue, especially as the grandeur of the event continues to escalate each year. The allure of the NFL's biggest game attracts not only genuine fans but also opportunistic scammers looking to exploit the high demand for ticke …
How to Avoid Concert and Event Ticket Scams
by Nicholas Foisy on October 13, 2023 at 2:21 PM
The concert scene has been buzzing this year with top-tier performances from Springsteen, Beyoncé, Ed Sheeran, Drake, Madonna, Morgan Wallen, Metallica, and the much-talked-about Taylor Swift Eras Tour. With the constraints of the COVID-19 pandemic behind us, there's much anticipation …
Understanding USB Flash Drive Security Risks and Forensics
by Danielle Corsa on August 15, 2023 at 1:00 PM
In the rapidly evolving landscape of corporate IT infrastructure, the use of USB devices in the workplace has become commonplace. While these devices offer flexibility and portability, they also bring a myriad of security concerns for organizations. The challenge lies in ensuring that …
Vishing: Over-the-Phone Scamming
by Matthew Colson on June 8, 2023 at 5:00 PM
It's always scam season, so it helps to stay vigilant all year round. Cyberattackers scarcely rest. They are constantly developing novel approaches for stealing confidential information and vast sums of money from businesses worldwide, disrupting operations and causing considerable da …
Different Types of Social Engineering Attacks Explained
by Diann Davids on June 2, 2023 at 9:30 AM
What Are Social Engineering Attacks Social engineering attacks are a common method used by cybercriminals to manipulate people into divulging sensitive or confidential information about themselves or taking actions that may cause harm to themselves or their organization. Social engine …
Tug-of-War: Balancing Security and Efficiency
by Justin Leach on May 26, 2023 at 11:00 AM
I find it helpful when explaining principles to think in extremes. So, when it comes to the principle of securing a system, what is the most secure? Let us use this computer I am typing on as an example. Off. That is the most secure. Let us even take the battery out, unplug everything …