You may have noticed that recently a lot of your accounts are now requiring multiple methods of verifying your identity when you login. No longer do you just enter your username and password to get into your email, your cloud apps, or your accounting system. You now...
Business email compromise (BEC) scams are on the rise. They target business owners and high-level employees in order to defraud a company, its customers, or its partners. In this type of scam, an attacker will pretend to be a trusted entity by spoofing a company email...
You’re probably no stranger to those little pop-up windows. They tell you software updates are available for your computer, laptop, tablet, or mobile device. You might be tempted to click on that “Remind me later” button. Don’t do it. Or, at...
We’ve come a long way in the last few decades as far as technology is concerned. Everything from banking to renting a Friday night movie has become streamlined. You don’t even need to leave your couch anymore! With just a few quick taps on your phone, you...