Just in

All articles from category

The Colonial Pipeline Hacked and ransom paid

Two lessons in network securityRemote workers are more vulnerable than those in the office; Colonial Pipeline was NOT hacked from inside; it was hacked through the computer of the employee working from homePaying the ransom is wrong; keep your backups up to date.The...

read more

BEC Taxonomy: Payroll Redirects

Last Time in the BEC Taxonomy Series… Proofpoint researchers in the second of the Business Email Compromise (BEC) taxonomy series began delving into the Theme tier of the Email Fraud Taxonomy framework (Figure 1), focusing on invoice fraud and demonstrating how the...

read more

The Latest in Phishing

Phishing Statistics and News Credential Phishing Attacks Quadrupled in Q3 2018 Proofpoint’s latest Protecting People: A Quarterly Analysis of Highly Targeted Attacks analyzes email attacks on Fortune Global 500 companies that took place from July to September 2018....

read more

Do you need IT support?

Our expertise is in network design, server deployments, remote access (VPN), and cybersecurity.