Blog

An Introduction to Spear Phishing – Part 2

What the Spear Phisher is After Our last blog examined what a Spear Phishing attack is.  In today’s blog, we examine what the primary targets are: 1. Money, Money, Money and lots of it: While other Phishing based campaigns focus on getting any kind of personal information and data, the Cyber attacker in this case, wants just one ...

Read More

An Introduction to Spear Phishing – Part 3

Incidents of Spear Phishing As we have reviewed, Spear Phishing, is quite different than the normal Phishing attack.  In these cases, the Cyber attacker just merely launches an all-out attack, in the hopes of being able to harvest sensitive information and data.  In these cases, typically, a hijacked e-mail address book (or even many of them) ...

Read More

How To Recognize a Phishing Email

How To Recognize a Phishing Email Introduction – The First Phishing Attack Truth be told, Phishing has been around for quite a long time.  In fact, it even predates the era of the Internet Bubble, which occurred in the mid to late 90’s.  The first known Phishing attack that was made public happened to AOL, in 1999.  ...

Read More

Microsoft Endpoint Manager

With COVID-19 and the mass migration to Work from Home (WFH) from the traditional office model, the focus on protecting company data in-transit and on both corporate and personal devices has increased.  The Zero Trust model of Security assumes every attempt to access information is a breach until the user proves who they are, and ...

Read More

What Are Managed Services, And Why You Should Demand This From Your IT Company

We all want to protect our businesses. They’re a part of who we are, and it would be devastating if anything bad happened — including an unexpected cyberattack. But it happens. Businesses are attacked every single day. Some businesses are left in ruin. Some can pick up the pieces, but at great cost. Then there ...

Read More

An Introduction To Microsoft Power Automate

When people hear the word “Automation,” the thoughts of complex solutions and James Bond-like Artificial Intelligence (AI) and Machine Learning (ML) tools often come into mind, as well as the expense.  But believe it or not, as technology has rapidly evolved in the last few years, so has Automation. Today, with just a few clicks of ...

Read More

Understanding Microsoft Clarity

In today's world, pretty much all of the marketing that businesses do in Corporate America is now of a digital nature.  Whether it is from sending out Email blasts or prospecting via Social Media, it is now all electronic based to reach out and interact with the customers.  The days of sending out snail mail ...

Read More

Protecting against new versions of Ransomware, using the Microsoft Security Stack

Ransomware is a threat variant that has existed for quite some time.  It is actually a sophisticated form of malware, and in these types of attacks, the victim’s device gets hijacked.  The screen becomes locked, and all of the files become encrypted with some unknown algorithm.  The only way that the victim can recover them ...

Read More

The CMMC – Common FAQs

The CMMC requirements have just started to roll out. As this time, there are a lot more questions being asked rather than Contractors and Subcontractors being CMMC certified. At the present time, the bulk of the Defense Industrial Base is most concerned about meeting the Maturity Level 1 compliance, and the process to achieve that ...

Read More

An Introduction To Multi-Factor Authentication

Given all of the security risks out there with the remote workforce, Corporate America is scrambling fast to find new ways to protect their mission-critical information and data.  Apart from the other safeguards that are being put into place, companies are now looking at a new approach to authenticate all employees and even external third ...

Read More