Was your e-mail hacked?

There are a few signs that your email account may have been hacked: Unfamiliar messages have been sent from your account. If you see emails in your sent folder that you didn’t write, it’s possible that your account has been compromised. Your contacts have received spam or phishing emails from your account. If your friends, […]

How do you spot a phishing e-mail?

A phishing email is a fake email from an outside party that has been designed to lure you into clicking on a link or performing a task that might be crucial for the company. These emails have become looking better and better, and many times can now look like they legitimately come from large companies […]

Facial Recognition & Cybersecurity

Human beings are uniquely adept at recognizing faces and interpreting facial expressions. The average person is capable of remembering and recognizing over 5,000 unique faces instantly. We’re so good at it that we can immediately spot a familiar person up to 50 yards away. For a machine to step up to the task of recognizing […]

Business Tech: Combating Cybersecurity Risks Associated with Mobile Devices

Cybersecurity is a top priority for most businesses. We recognize that owning a small or medium-sized business doesn’t protect you from hackers. In fact, they increasingly target smaller businesses because the security efforts are often much easier to get past than the larger enterprises. You have to be concerned about the rising instances of ransomware […]

5G and Cybersecurity Implications

Cellular service has always been about speed, even from the very beginning. The lower the call drop rate, and the more dependable the connection, the better a carrier fares. As mobile phones have moved away from calling functions to become mobile computers, speed definitely matters. 5G, the common shorthand for “Fifth Generation Cellular Wireless” is the […]

Business Tech: Cybersecurity Checklist for 2020

As we enter 2020, the new year is a great time to assess your IT processes and see where your cybersecurity protocol might need to be improved. Whether you’re doing a fantastic job with data protection, or you need to shore things up, it’s always best to know where your company stands in terms of […]

New Orleans & Cybersecurity

In mid-December, the city of New Orleans suffered a cybersecurity breach so severe the mayor called a state of emergency, demonstrating a significant change in the cybersecurity landscape moving into the New Year. The ransomware attack in New Orleans began about 5 a.m. Dec. 13, when “suspicious activity” was detected on the city’s network, according to NOLA […]

Password Management & Cybersecurity

Cybersecurity information is readily available and widely circulated today. So have online hacking incidents decreased substantially? Not exactly. Hackers are still targeting personal credentials because they’re a slam dunk way to gain access to private information. According to Verizon’s 2019 Data Breach Investigations Report, stolen credentials account for 29% of all breaches, with 80% of hacking […]

Business Security: Malware to Watch Out For

The last thing you want to hear is that you have malware on any of your devices. Even worse is finding out you have malware that has infected your business computers. Business malware works the same way as other types of malicious software — and its aim is to get into your machines and compromise your […]