1801, 2019

Safeguard your iPhone from phishing

By |January 18, 2019|Categories: Apple|Tags: , , , , , , , |

Phishing scams have been around for years, and they’ve gotten smarter with time. Recently, criminals have been targeting iPhone users through a voice phishing scam that makes the call appear like it’s coming from Apple Support. Fortunately, there are simple but effective tips so you don’t fall prey to this [...]

2509, 2018

Don’t let hackers fool you with these tricks

By |September 25, 2018|Categories: Security|Tags: , , , , , , , |

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing [...]

2708, 2018

New Office 365 cyberattack on the loose

By |August 27, 2018|Categories: Office|Tags: , , , , , , , , |

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works. Step 1 - Invitation to [...]

1808, 2016

4 Social engineering scams to watch out for

By |August 18, 2016|Categories: Security|Tags: , , , , , , , |

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users [...]

Go to Top