
Winner Announced in Dark Web ID Contest!
We are excited to announce the winner of our “Tell Us Your Story” contest! Jeff Reiter of RWK IT Services in Frankfort, IL submitted our winning testimonial, as voted on by a committee of 10!
Read MoreWe are excited to announce the winner of our “Tell Us Your Story” contest! Jeff Reiter of RWK IT Services in Frankfort, IL submitted our winning testimonial, as voted on by a committee of 10!
Read MoreWe were thrilled to see how many of our MSP Partners utilized the resources we provided to help educate their customers during National Cybersecurity Awareness Month in October.
Read MoreBreach news to share with your customers!
Read MoreMSPs should read this, then enroll themselves and every customer in SpotLight ID NOW Chances are, you’ve come across cleverly-crafted ads on sites like CNN.com, Facebook, Yahoo and others that say something like, “Use this site to find out anything… about anyone.” If you are like most good citizens, you probably passed up on the opportunity to use one of these sites to dox, or to search for and publish private or identifying information about an individual on the Internet, typically with malicious intent. Good for you!
Read MoreThe Parliament’s computer network was recently targeted by a brute force attack. Weak password requirements allowed hackers to gain access to 90 of parliaments 650 member’s email accounts. Although IT staff or 3rd party cyber firms can implement strong cyber-security regulations, the members of the House of Commons, or employees at any company are typically the source of a breach. Without knowing it, Members of the Parliament created threats for themselves, that went undetected until it was too late. In order to minimize the damage or the attempt of blackmail, officials temporarily locked members out of their email accounts.
Read MoreWhen it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of a network to unleash a catastrophic chain of events within that network.
Read MoreStolen email credentials are an often exploited vulnerability for government and corporate networks. In fact, Verizon announced in a recent study that 91% of phishing attacks specifically targeted email credentials.
Read MoreThe IRS recently issued an alert, warning Human Resources or Payroll professionals to be on the lookout for an email scheme designed to steal employee data from W-2 forms. The scam has already claimed some high profile victims, such as Snapchat, and is especially threatening as employees are in the midst of tax season.
Read MoreVerizon’s recent announcement of a data breach in their Enterprise Solutions unit is just the most recent of a staggeringly high number of organizational data breaches in the U.S.
Read MoreAre you concerned about hackers stealing your organization’s email credentials and accessing your organizations PII or confidential information? If you’re not, you should be.
Read More