How To Spot A Phishing E-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

How To Avoid Being A Victim Of Ransomware

Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat was fairly straightforward: Pay us or we’ll erase your files.

Ransomware, like the WannaCry attack, works by encrypting your files to prevent you from using or accessing them.

The #1 Way A Hacker Will Get You Is…

A weak password is still one of the most common ways hackers break in.

Thanks to sophisticated brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours.

What Is The “Dark Web” Anyway?

The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers and cybercriminals.

Working from home? DON’T DO THIS!

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop to log in to cloud applications – DON’T! Unless your personal device is covered under our managed services, you could accidentally introduce a virus to the company’s network.