Be wary of a new, devious phishing scam

temp-post-imageAnother day, another scam. Here's one that is particularly insidious.

Cyber criminals have evolved, creating increasingly intelligent malware. One such virus even impersonated an established brand to gain entry.

Email from an e-signature service widely utilized.

Email attachments will consist of an empty picture containing empty svg images carefully embedded within an HTML file (please be patient).

Clever malware that bypasses security software.

Your business could be put at risk as the code within this image redirects users to a malicious website.

By simply opening an attachment, it's possible for malware to infiltrate your device or network and put your data at risk of ransomware attacks, leavin...

Do you have cyber security measures in your business that are under-utilized?


Let's examine a topic that may give us chills--cybersecurity skeletons in the closet. While it's possible that there may not be any actual skeletons lurking, cybersecurity vulnerabilities could still exist and be waiting to cause havoc.

At times it can be difficult to remedy things without first knowing they exist, so now is the time to address any hidden dangers in your business. By taking proactive steps you can protect against potential cyber-threats.

Be proactive by recognizing potential threats that could put your business at risk, here are the top cybersecurity risks SMBs face.

Outdated software: the nightmare with cobwebs

Updates can be an inconvenience, and running outdated software can ...

Be wary of Facebook ads that seem too good to be true.

temp-post-imageHave you been browsing your Facebook feed when an advertisement promising to expand your business using artificial intelligence-powered software suddenly appears? Have you been fooled? We all have been!

Doesn't that sound enticing? You click without even giving it much thought.


Cyber criminals are creating Facebook ads promising to improve productivity and income; when clicked upon they contain hidden dangers that require further action before success can be achieved.

They are tricking you into installing malware (malicious computer software) instead of what was requested of you.

Criminals could access your Facebook data and advertising budget from the computer containing it.

Your initial...

Are you eager to test new features first-hand? Don't be intimidated! Take the plunge! Don't hesitate! Don't hold back from taking a chance on new options.


Are you ever tempted by the promise of downloading and trying out a beta version of an application, eager to be the first person to experience its new features?

Be careful! WARNING!! You might want to reconsider some of the news you hear from the FBI.

Cyber criminals are using an ingenious trick to lure unaware victims into their lair. By placing malicious code within fake versions of popular applications, cybercriminals turn the mobiles of unsuspecting users into personal piggybanks.

Don't take us wrong; we share the enthusiasm for innovation shared by any group of tech enthusiasts. Beta versions may hold allure for some, but they haven't gone through the same stringent security checks as app...

Are we to assume this email from Microsoft represents a genuine attempt at phishing?


Your email inbox is full of threats; have you ever considered that an email from Microsoft could become the biggest fear?

Microsoft, the tech company we all rely on and trust, is one of the most copied brands when it comes to phishing scams. Cyber criminals will send emails containing links or files containing malicious malware in order to gain access to sensitive data and steal it from users.

Microsoft isn't at fault; however, you and your staff should remain wary of anything suspicious that arises in the workplace.

Microsoft was the most copied brand by criminals during the second quarter 2023, accounting for 29% of phishing attempts.

Apple (at 5.2%) and Google (19.5%) both boast significantly...

Free VPNs may be dangerous: Are You at Risk?


Do you know that global VPN usage is on the rise? Virtual Private Networks are used for various reasons; providing greater security, anonymity, and access to geo-restricted online content.

Here lies the billion-dollar question: are all VPNs equally good?

No. This could have serious ramifications for your business.

Though attractive, free VPN services may not always deliver what they promise. Take a closer look at them before making your decision.

Understand the costs involved with running a VPN service aren't free - servers, infrastructure and staff all cost money.

How do VPNs offering free services make their profits day in and day out? Some use tactics which compromise your privacy or security...

Implement threat modeling techniques to lower cybersecurity risks


Businesses must remain proactive against cyber-threats as cybercriminals target sensitive data and assets. Data security threats come in many forms.

Modern offices are digitally advanced. Virtually all activities depend on technology and data exchange; hackers can gain entry through various entry points such as computers, smartphones, and cloud applications.

Cybercriminals have the capacity to penetrate an estimated 93% of corporate networks.

Threat models are one way of combatting intrusions. Cybersecurity employs this process of threat modeling; this involves identifying possible threats and vulnerabilities for an organization's systems and assets.

Threat modeling helps companies prioritize t...

An alarming statistic: 87% of businesses were affected by cyber security incidents last year.

Think cyber attacks only target large corporations? Unfortunately, that is not true.

Recent statistics revealed that almost two thirds of small and medium-sized businesses (SMBs) experienced at least one attack within the last year - an alarming statistic which should serve as a wakeup call to companies everywhere.

Worse still, almost all businesses report at least two successful cyber attacks each year; on average, businesses typically experience approximately five cyber-incidents per year.

Terrifying. Washoe County residents face increasingly frightening attacks each day; but how can we stop these atrocities from taking place?

Malware and ransomware attacks are some of the most frequent cyber ...

The latest trend in phishing attacks


As is often stated, "A picture speaks a thousand words", cybercriminals are making use of this truthful statement to their advantage.

Cybercriminals have come up with an innovative method for their phishing campaign: They lure victims into clicking images instead of downloading malicious files or following suspect links.

Discover how to protect your business against these unexpected attacks by understanding the early warning signs.

What makes clicking an image special? Perhaps it's to promote an amazing offer or limited-time specials.

Clicking an image won't take you directly to its respective website; rather, it leads to an impostor site designed solely to collect personal information.

Imagine ...

Explore with peace of mind: Microsoft Edge offers enhanced protection.


Browsing the internet can be dangerous; one malicious link could compromise all of your company's data.

Cyber criminals use automated tools to launch attacks against businesses, so it is vital that you remain on top of your online security.

We're thrilled to hear that Microsoft plans on rolling out an update for Edge that will enhance security for all users.

Addition and enhancement are two different strategies used to strengthen security systems.

Password Monitor can keep an eye out for potential password compromise, alerting you immediately should any such breach take place.

SmartScreen is another technology designed to safeguard you against phishing scams, malware and other forms of malicious...