Never ones to idly stand by while pain, suffering, fear and desperation abound, Cyber criminals have pounced on the opportunites created by COVID-19. And sure enough, the FBI has reported a spike in fraudulent Unemployment Insurance claims since the onset of the Coronavirus. Cyber criminals have exploited the pandemic using their complete toolbox of cyber … Continue reading FBI Reports Spike in Fraudulent COVID-19 Unemployment Insurance Claims
Author: threatucation
Security in the Supply Chain
If you haven’t already, chances are you will be required in the next year or two to submit proof to a supplier or customer that you are taking all reasonable precautions to secure their data or network when you access them. With hackers learning that the easiest way into a large enterprise’s treasure trove of … Continue reading Security in the Supply Chain
Importance of Risk Assessments
As a Pisces, I’m naturally empathetic. As an IT Consultant for the past 15 years, that empathy has developed in me a passion for securing my clients’ networks against the near-daily attacks they face from hackers. Knock on wood, I have been fortunate that my small business customers in that 15 years have experienced only … Continue reading Importance of Risk Assessments
Market Your Security Measures
The most common lament about cyber security for small business owners is it drains profits while adding no value to the business. That shouldn’t be the case, however. Let’s set aside the truth that proper cyber security measures reduce the likelihood of a successful attack and the ensuing headaches, including bankruptcy, which engulfs 60 percent … Continue reading Market Your Security Measures
Why Hackers Like Social Engineering
You’ve undoubtedly seen the movies where highly skilled hackers need only a few minutes to crack the most secure computer networks in the world. The reality is quite different. Successfully hacking a network, even a small business network protected by just anti-virus and a firewall, takes days, weeks and even months. That’s why hackers often … Continue reading Why Hackers Like Social Engineering