Phishing attempts (and success rate) through the roof in 2021

phishing

Phishing. It’s a tale as old as time (well, as old as email, anyway…). It’s been a persistent threat for decades, but is becoming more sophisticated, more successful and more insidious with every passing year. Yes, our understanding and expectations of being phished are rising… but so too are the skill, cunning and ruthlessness of the phishers. And so far … Read More

Ransomware-as-a-Service — the darker side of the Colonial Pipeline hack

Ransomware-as-a-service

It would have been pretty hard to miss the news of the Colonial Pipeline hack. We wrote about it here to advise our enterprise clients what they needed to know about, and what it meant for their collective futures. It got play in outlets the media world over, and for good reason — when the pipeline that feeds the entire … Read More

Colonial Pipeline hack — what your business needs to know

Colonial pipeline

About two weeks ago, one of the largest physical infrastructure cyberattacks perpetrated against the United States hit the Colonial Pipeline. That pipeline, responsible for nearly 50% of the East Coast’s fuel, had to be shut down for a significant period of time before the company capitulated and paid the ransom demand to regain access to their critical files. It was … Read More

What to know about new malware if your company runs on Mac

Mac lovers have touted multiple advantages over Windows-based machines for years. These claims haven’t always been substantiated by real data, sure… but folks love Apple computers and have for a while now. One of the advantages claimed for years and years is that Macs are less vulnerable to hacking, ransomware, malware, etc. While that may have been true a decade … Read More

How the news endangers your company’s security

News & cybersecurity

The news media catches a lot of heat for a lot of different reasons. Much of that is justified, some of it not so much. But regardless of where you fall on that particular ideological spectrum, if you own a business, the news can be a huge threat to your cybersecurity and IT reliability. Wait… what? I know, I know. … Read More

The FireEye hack shows just how vulnerable everyone truly is

Whenever a company or government is hacked, they usually call a cybersecurity forensic company to investigate: who did it, how did they do it, why did they do it, what were they after, and how do we protect ourselves going forward? One of the preeminent players in this space is FireEye — they’re experts on state-backed hacking (especially Russia) as … Read More

Phishing attacks are more cunning than ever — what to watch out for

phishing

Despite the massive coverage of phishing attacks in the business press, industry press and more general press, it’s still one of the most prevalent ways hackers steal passwords. While consumers and employees alike are getting somewhat better at identifying phishing attempts, so too are hackers getting more advanced in constructing elaborate phishing schemes. The hardest place to identify phishing emails? … Read More

CoVid-19 phishing scams are on the rise — what to know

phishing

No event in living memory (unless you’re 106 years old) has impacted daily life across the globe as completely and deleteriously as CoVid-19. The coronavirus and its disease have upended every facet of daily life for basically everyone in this country. Every child is home schooled now; every office is at home unless you’re an essential worker (our thoughts, thanks … Read More

How OpenDXL Ontology could change your technology stack

OpenDXL Ontology

One of the most common subjects on this blog is cybersecurity. It’s by no means all we do as a managed IT provider; but, when your #1 goal is uninterrupted uptime for your clients, security breaches rank pretty high on the list of things we have to watch out for. It’s also the space within our industry that sees the … Read More

SIM swapping: what you need to know about this growing threat

SIM swapping

If you’re like most Americans, you probably don’t really interact with SIM cards all that much any more. Unless you’re traveling abroad and need to swap a SIM card out to connect to that foreign network, you might not even know where the SIM card is on your iPhone or Android device. But, that simple, tiny piece of plastic could … Read More