Blogs

Social Security Scam Alerts

It’s no secret that scammers use peoples’ Social Security numbers for identity theft, and there are lots of ways they go about it. They have…

Read More
keeping children safe online

Keep your children safe from online predators, scams and identity theft

The Internet is for everyone, including young kids and teens. It’s a great avenue for them to play games, text, make videos, etc. and to…

Read More
woman focused on desktop computer screen

Don’t be fooled by unwanted appointments showing up on your Google calendar

People are on the move again. Vaccinations rates are up and COVID numbers are down, and a lot of people are traveling, especially now that…

Read More
yellow rubber duck on laptop

Beware of the Rubber Ducky!

If you happen to stumble upon a USB drive of any kind, DO NOT USE IT. It could easily be a hacker baiting you for…

Read More
white face mask on laptop keyboard

Social media impersonators; the new threat landscape

Online impersonation is growing more prevalent every day. When it comes to infiltrating an organization, cybercriminals have more tricks up their sleeves than just phishing…

Read More

Malware: What is it, and how does it work?

Malware is a catch-all term for any software that is meaningfully designed to cause extensive damage to a network, server, single computer or any mobile…

Read More
man working on tablet in server room

1 vs. 100 – Why you need a Managed Service Provider (MSP): Practical vs Impractical

Your business is like a machine. Every department is a cog, well-greased and moving toward a similar goal. Machines work well when all other variables…

Read More

Identity theft scenarios to help you avoid becoming a victim of stolen identity

Although you cannot completely prevent identity theft – for example, your personal information is compromised in a data breach – there are many ways you…

Read More

Sextortion – Don’t be a victim!

Sextortion is a sensitive subject AND now is one of the top three online scams that people need to be aware of. Trust me it happens!…

Read More
woman sitting on stool at countertop

Cybersecurity best practices for SMB doesn’t stop with your MSP

When it comes to protecting your small-to-medium-sized business (SMB) against cyber attacks, your managed service provider (MSP) can only take your cybersecurity so far. It…

Read More