<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

Tech Minute: The Best Way to Stop Employees from Clicking on Phishing Scams [Case Study]

In a world where cybercrime is a daily threat, but concerns for it are often set aside for things like convenience or cost – how do you stay safe?

Luckily your IT professional has established security features like firewalls, antivirus, and other protections that keep you safe. However, a simple click can unravel that safety in a split-second.

Scams also known as “phishing,” ask for permission to run on your computer and if that permission is granted no amount of firewalls or antivirus can save you.

As cybercrime ups the ante, what is your game plan?

Read More

Ask an IT Guy: I Have the Best Business Antivirus – I’m Secure, Right?

With the number of security threats going around today, business executives have security on their minds.

While most don’t argue about the need for antivirus, (yes, I’m looking at you Mac users), does having the best business antivirus solution mean you’re protected from all IT security threats?

Read More

Tech Alert: Top 5 Types of Email Scams Employees Keep Falling For

How many different kinds of shoes do you own? Think about it. Dress shoes, sneakers, boots, flip-flops, etc., there are so many types of shoes for different occasions.

Similarly, there are many types of email scams that hackers run to steal your information.

And while a scam is a scam, much like a shoe is a shoe, the difference is in the approach. We have reached a critical point in scamming where the wheel is turning at a much faster and more focused rate.

Educating your employees on the kinds of scams and their purpose(s) can go a long way in a strong united defense for your company.

Considering the fact that companies can be down for hours or sometimes DAYS following one wrong click, the stakes are much too high to ignore scamming styles any longer. 

Read More

Tech Trends: How to Avoid the Growing Number of Email Scams

One thing is for sure in IT security: hackers aren’t reinventing the wheel, but they’re definitely giving it a new spin. Post WatchGuard Partner Summit, our team came back with some staggering stats. Did you know email scams make up around 60% of the phishing, ransomware, and malware infecting businesses today?

Hackers have become so good that they can trick even the most tech savvy computer user. There is little standing between your business’ system and a massive attack, so what can you do?

Read More

Tech Alert: DocuSign Data Breach – Email Hacking Campaign

Here we go again, more pirates from the Dark Web’s waters have stolen information to hack your system.

These cyber pirates, also known as hackers, were able to compromise the customer and user email database of DocuSign, a major provider of electronic document signing services. In the back of your mind, I’m sure you’re thinking, “So what? A lot of people have my email address.”

Read More

IT Untangled: What Do Hackers Want With My Business Data?

In the days of the “Wild Wild West,” stealing was as simple as who had the most guts and the biggest gun. Cue a western bank robbery scene with tumbleweed included.

Read More

Tech Alert: How Small Businesses Can Test Their Firewall

When was the last time you manually checked your oil? If your car is anything like mine, I let it tell me when I need an oil change or anything else for that matter. I don’t pounce until the dash lights up.

Unlike my car, your company’s security firewalls most likely doesn’t come with a light that alerts you to its needs. Beyond checking that the firewall is on/active, how do you test your firewall for accuracy?

Read More

Tech Minute: The Wi-Fi Pineapple and Small Business

The Internet is a life staple. Think about it, what isn’t Wi-Fi enabled in your life? From our cars to our coffee pots, the Internet of Things (IoT) has taken over our everyday lives.

Along with the growth of Wi-Fi enabled devices, comes a greater number of entry points for hackers to infiltrate. Smart devices, in many cases, give hackers what’s known as “backdoor” access to personal information, sensitive data, and bank account access.  

Basically, hackers can sneak into your device and steal your information all because you logged into your account(s) on a Wi-Fi network. If your mind isn’t blown yet, wait until you read how they do it.

Read More

Tech Minute: The Deep Web's Effect on Small Business

We have this notion that all the bad stuff on the internet takes place in a dark room.  Some faceless guy in a hoodie hunched over his computer screen, discreetly, but effectively, wreaking havoc on the world. 

That, ladies and gentlemen, is from watching far too much made-for-TV police dramas. The truth is, the “bad guy” isn’t usually just one person. It’s more likely a group activity. Consider it a mafia of digital hackers working to get their hands on top dollar information.

Beyond Chrome and Internet Explorer -- a.k.a. the “regular web” or indexed web's -- search engine capabilities, there is the Deep or Dark Web.

Read More

Tech Alert: Phishing Scams -- Can They Be Avoided?

76 percent of organizations have suffered phishing attacks.Wombat 2017 State of Phish

 “Go fish” just got a whole new meaning.

Phishing scams are getting harder to detect. Pronounced “fishing,” phishing is a way for hackers to get you to turn over passwords, sensitive company data, and bank account information. Usually, it comes in an email, but it can also be web-linked. Hackers plagiarise bank and payment services like PayPal’s logos and email templates to look like real emails. That’s why they’re so hard to detect!

Read More