Who Crossed the Red Cross?

Introduction

When you hear about the Red Cross, what first comes to mind? Is it donating blood and plasma? Is it disaster relief and recovery? Do you have some kind of personal story that goes along with the organization?

So in many ways, it makes sense that a threat actor who relies on social engineering techniques would try to capitalize on the Red Cross’s good reputation to trick victims into sharing personal information.

Why the Dark Web Loves PHI

Introduction

Private health information, better known as PHI, refers to all of that confidential patient data stored within health organizations’ physical and digital systems. Although PHI laws initially referred to verbal communication and physical
documents, the onset of the digital age guaranteed swift legislation aimed at covering that digital gap—for instance, the widely recognized Health Insurance Portability and Accountability Act (HIPAA) law of 1996.

If you work for a healthcare organization, or even occasionally contract with one (as a lawyer or tech support might), then you know just how important and confidential the data on your systems really is!

PHI on the Dark Web

PHI is one of the most valuable types of data on the dark web.

Behind the Average Ransomware Attack

Introduction

If you’ve been following this blog for awhile, then you’ve probably heard about the dangers of ransomware a lot. Hopefully, you’ve even picked up a few tips about how to recognize, handle and report ransomware schemes.

Just how bad can these attacks really get, though?

That’s exactly what we’re going to explore here.

Falling for Common Internet Scams?

Introduction

The internet is a vast and ever-changing landscape, and with that comes both good and bad. One of the downsides of the internet is the prevalence of scams. Scammers are constantly coming up with new ways to trick people into giving them
their money or personal information.

The Danger Of Holiday Phishing Scams: How To Recognize And Avoid Them To Stay Safe This Holiday Season

The holiday season is in full swing, which means so are the cybercriminals! While you’re making holiday gift lists, they’re plotting and scheming new ways to take advantage of unsuspecting online shoppers. Holiday phishing scams have become an all-too-common threat, targeting customers to steal personal information, financial data and even identities.

What Should Businesses Pay For IT Support And IT Services?

One of the most common questions we get from new prospective clients calling our office is “What do you guys charge for your IT services?”

While price certainly needs to be one consideration, it’s extremely important you make an informed decision and choose the right IT services company instead of using price as the main deciding factor.

May A Force Field Be With You

“That won’t happen to me” is something many business owners say when discussing cyberscams and the need for adequate protections for their business, but these days it’s getting to be a really, really stupid statement that you definitely don’t want your clients, employees and banker to hear.

The Bad Bot Takeover Is Here

There is one extremely common threat to our security that nearly everyone has witnessed but hardly anyone talks about – bad bots. These silent attackers are often thought of as annoying spam accounts posting computer-generated comments online. They are so common that most of us tend to scroll by them without noticing, but in reality, bad bots are much more dangerous, particularly for business owners.