VA Data Breach Exposes the Personal Info of 46,000 Veterans
by CJ Hurd on September 24, 2020 at 1:00 PM
Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.
Situational Awareness – How Strong Are Your Spidey Senses?
by Peter Fellini on September 17, 2020 at 3:15 PM
How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.
Home Network Security for Remote Workers
by Adam Cravedi on April 8, 2020 at 1:00 PM
The COVID-19 pandemic has presented unprecedented global challenges at all levels of society today, from healthcare to social concerns. With much of the East and West Coasts experiencing government-enforced social distancing lock downs, businesses have had to scramble to turn their da …
Grocery Stores – A Hidden Gem for Cyber Criminals?
by Nicholas Foisy on March 25, 2020 at 11:00 AM
Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …
Microsoft Teams – The New Phishing Platform for Hackers?
by Jesse Roberts on March 13, 2020 at 1:00 PM
Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …
Examples of Effective Vishing Attacks
by David Bienkiewicz on March 4, 2020 at 2:00 PM
Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …