Practical Steps for Dealing with Suspicious Emails
Last week, when posting on LinkedIn about a new type of phishing scam, callback attacks, we promised to blog here with some ideas on...
Last week, when posting on LinkedIn about a new type of phishing scam, callback attacks, we promised to blog here with some ideas on...
Facebook. Nieman Marcus. T-Mobile. Panasonic. Volkswagen. These are just a few of the familiar names that suffered data breaches affecting millions of users last year. What...
From what we see with active monitoring of client networks, threats can be discovered on a daily basis. Because some of these threats can...
You already may have seen others touting the fact that today is World Password Day. It’s sort of corny, sure, but there’s never a bad...
When it comes to security, business leaders of course invest in door locks, proper outdoor lighting and perhaps even a security guard on-site. When their...
No, we’re not talking about some 12-step program here… we’re still sticking to IT, network architecture and cybersecurity, people! What we’re referring to are the...
A couple weeks ago, a 4-person, home-based catering company in Irvine found Cynexlink online and called us for help after a ransomware attack. They were...
Or, more specifically when it comes to passwords, length is critically important. This means the "standard" 8 characters are no longer enough – even if...
Virtual machines, or VMs, have become integral parts of business-oriented computing. A virtual machine acts as an emulator of a computer, executing programs like...
884. That’s the number of patches Microsoft issued for its software and services yesterday, as it does each month on the 2nd Tuesday. Yes, nearly...
While 2022 is off and running, one recent phenomenon remains true: cyber criminals are always coming up with new ways to rip you off. To...
I hope everybody is doing well and staying safe. Holidays are around the corner. Here I want to share a good question asked by a friend...