
BLOG

5 Signs It's Time to Upgrade Your Outdated IT Infrastructure
You’ve likely heard the old adage “If it ain’t broke, don’t fix it”. While that can be true about some things, following this advice when it comes to IT infrastructure can be a dangerous, and costly, mistake.

93% of LinkedIn Users' Data Scraped and Up for Sale Online
For the second time this year, data from 700 million LinkedIn users is up for sale online, potentially putting nearly 93% of their user base at risk of social engineering and spear phishing attacks.

Top-Clicked Phishing Email Subjects: Q2 2021
There has been a significant rise in phishing email attacks related to HR topics, especially those regarding new policies that would affect all employees throughout many types of organizations.

What's That Term?: Ransomware
Ransomware is an ever-evolving form of malware designed to hold a victim’s data for ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access.

New Phishing Attacks Bypass Secure Email Gateways
An ongoing phishing operation that has stolen around 400,000 OWA and Office 365 credentials since December has now expanded to exploit new legitimate services in order to bypass secure email gateways (SEGs).

Top-Clicked Phishing Email Subjects: Q1 2021
Emails purporting to come from HR and security-related notifications are on the rise as employees return to the office.

Got Certs? Our Team Does.
Check out our team members that received new technology certifications this quarter. These certifications not only mean that these people are wicked smart, but also that our clients are being supported by the best in the game.

How Your Supply Chain Can Impact Cybersecurity
Your supply chain can create a number of vulnerabilities in your network, so it’s important to not only focus on your own cybersecurity efforts, but to also be aware of the organizations you partner with and their security practices.

Two-Factor Authentication Isn't as Secure as You Think
Two-factor authentication raises the barrier to account access by requiring a secondary proof of identity, but it still has a number of weaknesses that can be exploited by cybercriminals.

Beware the W2 Phishing Scam
For the past several years, thousands of businesses have been hit with phishing scams during tax season - and this year is unlikely to be any different.