Triple extortion ransomware targets bigger groups. Cybercriminals use it to threaten both the hacked entity and their associates.
Triple Extortion Ransomware Read More »
Triple extortion ransomware targets bigger groups. Cybercriminals use it to threaten both the hacked entity and their associates.
Triple Extortion Ransomware Read More »
Fake ransomware takes less to pull off and poses a growing threat. Cyber criminals no longer need to encrypt all your data to attack.
Blog Byte: Fake Ransomware Read More »
Third party authenticator apps are a more secure way to do MFA than receiving a confirmation text or email code. Need help choosing one?
Blog Byte: Choosing a Third Party Authenticator Read More »
Multifactor authentication (MFA) is a method of layering your account security. More and more accounts are allowing you to use it. But how?
Blog Byte: Enabling MFA Read More »
FlyTrap is an Android Trojan malware that targets your Facebook accounts. It steals your information and messages your friends links to install it on their devices.
Blog Byte: FlyTrap Read More »
Maintaining digital backups is a lot like keeping a photocopy of a paper file in a safety deposit box. You have a copy of the information in a safe place so you can access it if something happens to the original.
How can we be trustworthy managers of the information that comes across our desks? A lot of it comes down to being data aware.
Stewarding Personally Identifiable Information Read More »
QR codes: Little squares posted on any number of places that allow you to access information conveniently…but are they secure?
How would you like to pay ransom to regain control of your coffee maker? Smart devices come with security risks.
Ransom for your coffee Read More »
Scareware: Software that manipulates us into either buying or downloading a cure for a problem we never had.