Security Tip of the Week – Watch Out for Sean Connery Related Scams
Bad guys will be sure to exploit Sean Connery’s death in a number of ways. Be extra cautious of any mention of Sean Connery.
Each month, Keller Schroeder’s subject matter experts provide content about the latest tools, services, and technologies to help you understand how you can better grow, protect, and optimize your technical environments. We also share weekly cybersecurity tips and you can find business cultural and leadership knowledge from our President.
Bad guys will be sure to exploit Sean Connery’s death in a number of ways. Be extra cautious of any mention of Sean Connery.
Cybercriminals spoof popular social media platforms like Twitter, Instagram, and YouTube by sending out fake verification emails.
Typically, short message service (SMS) messages are short, vague, and include a link—which makes them great for spoofing!
While you get ready to shop Prime Day deals, the bad guys are getting ready to scam you any way they can. Are you prepared?
Cybercriminals are using this an attack on Twitter as bait for a convincing phishing scam. Don’t fall for it!
Working with a third-party organization can be a great help, but what happens if that third party falls victim to a cybersecurity attack?
Hackers prefer the little guy. The high-profile data breaches you read about in the news — your Facebooks and Equifaxes and T-Mobiles — are only the tip of the iceberg when it comes to the digital crimes being perpetrated day
Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the
Brad Mathis – [Senior Consultant – Information Security] Imagine the following scenario. You are going through your daily routine and you receive an urgent email from the CEO. The email is urgent, appears to be time sensitive, and is requiring you to
Brad Mathis, Senior Consultant, Information Security It is mid-2015. By now, we have all seen incoming emails claiming we have been bequeathed a huge sum of money from a Nigerian Prince, or we have won a foreign lottery we never entered.
Want to receive our monthly newsletter? Send us your contact info below to join our mailing list.