Sophisticated Google Docs Phishing Scam

Phishing Emails have been very prevalent this year. It was recently identified that the latest version is pretending to be a shared file from Google Docs. <<<See image on email message>>> As published in Wired (https://www.wired.com/2017/05/dont-open-google-doc-unless-youre-positive-legit/): If you get a Google Doc link in your inbox today, scrutinize it carefully before you click—even if it looks like it comes from …

The Dangers Lurking When Employees Use Work Email Addresses for Personal Use

Many companies likely have had their email credentials compromised without realizing it. In September 2016, researchers revealed that they found about 5 million unique business email credentials stored in hackers’ dump sites and other underground cyber markets. When the researchers crosschecked the compromised email addresses against the domains of the top 1,000 companies in the FORBES Global 2000 list, they …

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ login information. If the password for your Google account is stolen, you could lose personal information, send unauthorized emails, and risk having other account passwords reset. For these reasons, Google encourages customers to set …

A Simple but Effective Way to Combat Ransomware Attacks

The number of ransomware attacks against businesses skyrocketed in 2016, and security researchers do not expect a slowdown anytime soon. They are also predicting that ransomware attacks will become more sophisticated. What won’t be changing, though, is the delivery method. Cybercriminals will continue to spread ransomware primarily through phishing and spear phishing emails, according to PhishLabs’ "2017 Phishing Trends & …

5 Types of Files You Should Back Up Regularly

Backing up your business files regularly is recommended in case a hard disk suddenly fails, a ransomware attack occurs, or another type of disaster destroys your data. However, not every file on your system is essential and needs to be included in these backups. You can save both time and space by backing up only the files critical to the …

5 Problems That You Can Solve With Effective Document Management

Some people will tell you that there is only one constant in this world: change. Businessmen, on the other hand, will tell you that there’s at least one more constant that they must contend with, namely paperwork. Every company on the planet has a way of keeping track of their documents. Yet, in spite of the technological advancements made over …

Why You Need an Email Policy and What It Should Include

If your business uses email as part of its communication strategy, you need to have an email policy. While creating this policy is not a fun or easy job, it is a crucial one. Knowing why you need an email policy can help motivate you to get started, and knowing the types of information to include can make it easier …

Cybercriminals Are Posing as Job Applicants to Spread Ransomware

If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it will go global. How the Attack Works Hackers like to target HR …

11 Ways to Secure Your Business’ Wireless Network

Wireless networks are popular in small and midsized businesses because they are easy to set up and convenient to use. However, if a wireless network is not properly secured, hackers within range can access it and infiltrate your network. Here are eleven ways you can lock down your business’s wireless network and keep hackers at bay: 1. Use a Strong …