It’s another tax season, and while most companies scramble to file their Internal Revenue Service (IRS) returns, scammers will be looking to capitalize on the chaos. Con artists use this time to elicit sensitive information from individuals and businesses, using the IRS as their preferred moniker. Falling victim to a…
Technology is the primary enabler of the modern economy. The rise of the internet with all its bells and whistles lead to an information revolution. Today’s companies and individuals have more access to information on-demand than ever before, but this comes with a host of risks. “Attack surface” isn’t a…
Managers are always pushing their employees to do more with less. The best managers will continuously look for opportunities to streamline bloated processes and reduce operational overheads. Unfortunately, managers are just as likely to become too busy with everyday issues and may no longer have the bandwidth to carry out…
While technology can significantly improve the quality of education a school provides to its students, it also creates additional risks. An area often overlooked when the school year is underway is network security. New threats emerge almost daily, making a school’s information management system particularly vulnerable if it doesn’t regularly…
If the number of high-profile breaches last year is any indication, cybercriminals are getting craftier. In 2019, the cybersecurity world saw the rise of new types of phishing attacks, plus brazen attempts to access networks through a variety of clever, new techniques. Cybercriminals stop at nothing to steal the most…
Anyone who has been paying attention to the latest cybersecurity news might have noticed a big story breaking in early December. Two Russian hackers were indicted in what is considered to be the largest cybercrime spree in history. Maksim Yakubets and Igor Turashev are the leaders of Evil Corp, a…
We’ve known for years now that Windows 7 (and Windows Server 2008 R2) will reach its end of life in January 2020. Well that time has finally come, and many people are still clinging to the beloved OS. Windows 7 was the most popular operating system after Windows XP, known…
It’s officially old news at this point, but thousands of businesses and organizations are still in denial or repeatedly muttering “it’ll be fine” over and over and over. One of the most popular and widely active versions of the Windows operating system—Windows 7—is approaching end of life. Mainstream support for…
Cyberattacks are forefront in the minds of every business owner, regardless of the type of business or the size or the company. No one is out-of-reach for these unscrupulous criminals. Despite the considerable efforts of IT technicians and sophisticated software designed to detect and prevent unauthorized access to your networks…
Falling prey to clever criminals tricking employees into handing over sensitive corporate data? If not, a company should consider itself lucky. The average employee receives four to five phishing emails per week. Phishing falls into the category of social engineering cyberattacks, which Accenture has identified as one of the most…