2509, 2018

Don’t let hackers fool you with these tricks

By |September 25, 2018|Categories: Security|Tags: , , , , , , , |

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing [...]

1011, 2016

Young workers are more gullible to tech scams

By |November 10, 2016|Categories: Security|Tags: , , , |

The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they're taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists [...]

710, 2016

Social engineering and cyber security

By |October 7, 2016|Categories: Security|Tags: , , , , |

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often [...]

1808, 2016

4 Social engineering scams to watch out for

By |August 18, 2016|Categories: Security|Tags: , , , , , , , |

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users [...]

2812, 2015

IT security predictions for 2016

By |December 28, 2015|Categories: Security|Tags: , , , , , , , |

Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can [...]

Go to Top