Tech Insights

rss

Contributor Columns on Information Technology and Security

two-factor-authentication3.jpg

The reality is that, if you don’t have Multi Factor Authentication (MFA) in place, and your employees fall for phishing scams or share passwords, well, your company is widely open to attacks. Compromised credentials represent one of the biggest security threat in today’s world. The reason is simple, compromised credentials ...

Fotolia_114026330_XS.jpg

Not all computer viruses immediately crash your device in a dramatic display. A virus can run in the background, quietly creeping around on its tip-toes, stealing things and messing things up along the way. If your computer has a virus, here’s what may happen: Windows suddenly shuts down. Programs automatically start ...

Fotolia_65570619_XS.jpg

What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up ...

Fotolia_80058986_XS1.jpg

Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, ...

Fotolia_224304641_XS.jpg

If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following: Fake Bitcoin Exchanges You have to use a Bitcoin exchange if you want ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its