by Emily Cohen | Jan 31, 2019 | Blog, Newsletter, Security
Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says you need to take immediate action to avoid penalties, you may be alarmed...
by Emily Cohen | Jan 31, 2019 | Blog, Newsletter, Security
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful — or perhaps concerned they clicked on something that caused the glitch — the employee follows instructions to send money, turn over personal...
by Emily Cohen | Jan 31, 2019 | Blog, Newsletter, Security
They’re about as welcome as robot calls and junk mail — spam text messages. They show up as unwanted and unexpected text messages on our phone screens. That’s aggravating enough, but it gets worse. Whoever is sending you a spam text message is usually...
by Emily Cohen | Jan 31, 2019 | Blog, Security
Spear-phishing is on the rise Imagine spending years developing a product your research says will take the market by storm. Grow your small business into a major player. Rewrite the rules for much larger competitors. Then comes the email from a potential investor...
by Emily Cohen | Jan 31, 2019 | Blog
Imagine a world where the U.S. Department of Health and Human Services’ Office of Civil Rights came knocking on every medical practice’s door saying, “Show me your HIPAA!” Would you be able to show them your technology is compliant? While there’s no certainty that...
by Emily Cohen | Dec 19, 2018 | Blog, Personal, Security
Wild things are coming your way There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond next month, much less the next...