What We’re Thinking

We’re passionate about technology, and we want to share that with you! Read our thoughts on technology, the latest security threats and business trends along with our ideas for ways you can incorporate new and future technologies into your life and business.

Single lit lightbulb on a cord next to multiple unlit lightbulbs
Old Files

Are You a Data Hoarder?

 |   |  Business & Strategy

Are you a collector? I don’t mean of something elegant like china pigs or Troll dolls…I mean are you a collector of “stuff”? Do you hold on to things, some of which may have never been used, were already used or simply aren’t needed anymore?

Read More >

Spear Phishing

Gone (Spear) Phishing

 |   |  Security

General phishing attacks are much less successful than they used to be; the ‘spray and pray’ technique of sending as many emails as possible in the hopes that someone will fall for it are becoming far less useful. So, unfortunately, the bad guys are getting smarter too. That’s where spear phishing comes in.

Read More >

VPNFilter

VPNFilter: Reboot, but Don’t Panic

 |   |  Security

It’s all over the news: Russia is in your router. The FBI is putting out news bulletins. Small businesses and home routers are both affected. This must be the end of the internet as we know it. …Not exactly. Is it scary and possibly dangerous? Yes, but before you panic, let’s take a look at what VPNFilter, the latest malware to cause global hysteria, does.

Read More >

EFAIL Email Encryption Vulnerability

EFAIL: Keep Calm and Don’t Disable Your Email Encryption

 |   |  Security

A vulnerability called EFAIL is being widely reported on after new research on the existing, but little-known vulnerability became available. In technical terms, EFAIL can allow a hacker to expose the plain text of some encrypted emails sent using the encryption technologies OpenPGP and S/MIME. In layman’s terms, if an attacker were to exploit this vulnerability, they could read emails that were encrypted (and therefore thought to be “safe.”) As is often the case when security issues are discussed in the media, reactions range anywhere between “So what?” to “We’re all gonna die!” Our job as security experts is to provide balance and help you separate sound guidance from hype.

Read More >

Digital Forensics

Digital Forensics: A Brief Overview

 |   |  Security

If cybersecurity is the proactive aspect of protecting electronic data, digital forensics is the reactive aspect. They are two sides of the same coin: one aims to build the wall, the other is dedicated to figuring out where and how the wall broke. They share a push-and-pull relationship and are permanently intertwined.

Read More >

Online Privacy: YOU Are The Product

Online Privacy: YOU Are The Product

 |   |  Security, Technology

A lot of people do not take “privacy” seriously enough. There is a general failure to comprehend that by clicking through an online agreement or EULA’s (End-User License Agreements) without reading or understanding, you have in fact agreed by proxy to have your data collected and mined. Surprised? Some may be shocked by what is being done with their personal data, but others, many who should know better, seem to be carefree with what they share online.

Read More >

Fake Microsoft Email Phishing Attempt

O365 Phishing Emails Have Arrived

 |   |  Security

We’re constantly on the lookout for the latest email and phishing scams, and there’s one we have seen going around revolving around Microsoft O365. Malicious emails are a numbers game – and the more people you can send them to, the more people you’re likely to get to click on the bad link.

Read More >

Cryptocurrency

Bitcoin: Why Should I Care?

 |   |  Security, Technology

You’ve probably seen a lot of words beginning with “crypto” in the news lately, and chances are you’ve heard of bitcoin – no matter where you work or what you do. Whether it was an ad on a website, or an article in a financial publication, cryptocurrencies have been getting a lot of press lately. We asked one of our security experts what you need to know about these currencies if you’re not familiar with them. 

Read More >

United States Currency

Why Are Attackers Targeting O365? It’s Where the “Money” Is.

 |   |  Security

We are seeing a huge spike in phishing attacks against Office 365 users. Why O365? Simple, it’s where the users are now. In 2017, Microsoft reported that their monthly active user count surpassed 100 million users. In the words of Maverick (from Top Gun), “that’s what I call a target rich environment.”

Read More >