The DANGERS Of Dropbox And Other File Sync Apps

When employees work from home, they need access to important company files. It’s easy to look at consumer-grade, cloud file sharing solutions like Dropbox, OneDrive, and Google Drive. But listen up!

These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.

Bookmark The LEGITIMATE Websites You Frequently Visit

Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com (extra "o") or www.dropbox.net (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to - and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.

How To Spot A Phishing E-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

How To Avoid Being A Victim Of Ransomware

Not too long ago, the WannaCry ransomware attack was all over the news, infecting over 400,000 computers. The threat was fairly straightforward: Pay us or we’ll erase your files.

Ransomware, like the WannaCry attack, works by encrypting your files to prevent you from using or accessing them.

The #1 Way A Hacker Will Get You Is…

A weak password is still one of the most common ways hackers break in.

Thanks to sophisticated brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours.

What Is The “Dark Web” Anyway?

The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers and cybercriminals.

Working from home? DON’T DO THIS!

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop to log in to cloud applications – DON’T! Unless your personal device is covered under our managed services, you could accidentally introduce a virus to the company’s network.