Blogs
How Business Email Compromise Works | Prevent and Protect
According to data compiled by the FBI, business email compromise (BEC) is one of the most damaging cyber crimes. All businesses rely on email to communicate, making almost any employee or client vulnerable to some level of compromise, which could be devastating...
Can AI make malware? It sure can.
Believe it or not, the history of artificial intelligence (AI) started in the 1950’s. Now 70+ years later and it’s grown in popularity and potential. Artificial intelligence enables computer systems to think and act like people. AI now has the potential to make...
What You Should Know About Spam Text Messages
By Mary Grlic “Spam” is defined as uninvited and insignificant virtual messages that have been sent to a mass number of recipients. If you have an email address or a cell phone, you’re no stranger to spam. You've definitely received some sort of spam text message(s)...
Stolen iPhone + Passcode = Easy Peasy Identity Theft Recipe
Does a Passcode (PIN) Really Protect your Phone in Public? Everyone puts a passcode (PIN) on their cell phone to keep their information safe (well, we hope 😅) but is it really all that secure? The Wall Street Journal recently reported about an iPhone crime wave that...
90’s Movie Office Space Goes Reality
In late December 2022, a software engineer in Seattle, Washington, was charged with stealing more than $300,000 from his former employer, Zulily. Ermenildo Valdez Castro, 28, allegedly adjusted prices of Zulily’s products and changed company code in order to “divert...
The Guardian Hit by Ransomware Attack
In mid-January 2023, The Guardian newspaper confirmed that it was hit by a ransomware attack back in December 2022. Hackers exploited the data of some UK-based employees. It also inhibited some of the functions of the media group. It was difficult for employees to...
All About Network Cables and Wiring for Your Small Business
By Mary Grlic Cables and wires are the highway for your data and communication. A good wiring system allows for a high speed internet connection, organization, and optimal internet safety. With a well-designed and well-managed networking system, you can be sure that...
Accounting IT and Cybersecurity
By Mary Grlic Protecting your IT is important for just about every industry. When dealing with finances, however, it becomes even more critical. Accounting information technology is growing in importance and requires a lot of attention to ensure total network...
Transportation Cybersecurity: Keeping Critical Infrastructure Safe
By Mary Grlic Transportation is critical infrastructure that helps us move goods and people safely, quickly, and securely. We rely on a lot of forms of transportation in today’s day and age, like boats, trucks, trains, cars, and planes. Even if we don't think about...
Malvertising Is Trendy Again; Meet the Rhadamanthys Stealer
Cybercriminals’ Latest Illusion There’s a relatively new cyberattack technique that you should be cognizant of. "Malvertising" (malicious advertising) injects malicious code into digital ads. The most disturbing aspect of malvertising is that, in some cases, you may...
2 Key Features of VoIP for all Small Businesses
By Mary Grlic Voice over internet protocol (VoIP) phone systems are a must have for any business. They offer so many features that allow companies to improve their productivity, make calls from anywhere, and stay connected with their customers. VoIP offers a lot of...
Fire Suppression for your Server Room
Keep your server room safe with the right type of fire suppression methods. Your company’s servers are one of the most important parts of your IT infrastructure. A server hosts and protects data within a network. Servers are expensive pieces of equipment. If they face...
VoIP for Nonprofits | Here’s What Nonprofits Need to Know
By Mary Grlic As with any business, having a reliable IT service is an essential for nonprofit organizations. For a lot of nonprofits, having good means of communication is one of the most important parts of operation. This means the right type of phone system for...
JFK Taxi Scheme – Dispatch System Gets Hacked
By Mary Grlic The United States Department of Justice recently announced the arrest of two men for, “conspiring with Russian nationals to hack the taxi dispatch system at JFK airport.” The suspects, Daniel Abayev and Peter Leyman, both from Queens, New York, hacked...
Vulnerability Assessments: A Must for All Businesses
By Mary Grlic Do you fully understand the system vulnerabilities within your business? How do you find ways to mitigate such risks/threats and improve internet safety? What would you do if you found out that a company device or server has been compromised? What steps...
Evolution of Ransomware: The Scary Reality
By Mary Grlic Ransomware has become far more of a threat than ever before for countless companies. As technologies evolve, cyber threats unfortunately become more common. Even newer security methods are sometimes not enough, as hackers could always be one step ahead....
Financial Cybersecurity – Keep your Money Safe
By Mary Grlic Protecting your financial information is important, especially when a lot of banking, investing, and transactions are done online. We often trust financial institutions when it comes to money – but how do we know our finances are truly safe? Having a...
Small Business Servers: All you Need to Know
By Mary Grlic Finding a server for your small/medium sized business can seem like a daunting task. It's one of those things that you might not completely understand, and possibly might even overlook. But when creating a small business network, your server is one of...
Why your Organization Must Conduct an Annual IT Risk Assessment
By Mary Grlic Technology makes our life so much easier. From accessing our emails anywhere to finding the nearest gas station using our mobile phone, technology is an essential. However this convenience may come with a cost. There are a lot of risks associated with...
A Look into Google’s Hybrid Work Study
Following the spike of Covid-19, business operation through a remote and hybrid workspace has become more common. Before the pandemic, only about 6% of employees worked primarily from home. At the height of Covid-19 in May 2020, more than one third of employed people...
Sonicwall Cyber Threat Report
By Mary Grlic Sonicwall’s recent mid-year cyber threat report details the danger of cyberattacks in 2022. With cyber threats becoming an increasingly concerning risk, Sonicwall’s report is especially important. Understanding these sorts of threats and taking the right...
Health Information Technology | Some Critical Pointers for Health IT
By Mary Grlic Healthcare is a critical infrastructure that is becoming more efficient by implementing the use of new technologies. Without the proper IT (information technology) management, medical providers and their patients may be put at risk. To stay in compliance...
Data Backups and Destruction
By Mary Grlic Wiping your hard drive disk (HDD) is the most effective way to ensure all your data, files, documents, and personal information are secure before putting your hard drive to rest. Deleting applications or files from your device will not be enough, as this...
Suffolk County Suffers Cyber Attack
By Mary Grlic Suffolk County in Long Island, New York, is dealing with an ongoing “cyber intrusion” (as deemed by officials) and ransomware attack after a hacker infiltrated the network. On September 8, 2022, the county legislature had to shut down their devices in...