Why Hackers love Holidays! 

Why Hackers love Holidays! Most people take a long-awaited chance to rest and relax during the holiday season. But cybercriminals and hackers see a huge opportunity to launch attacks. Why you ask?   Here are the top 3 reasons why cybercriminals love the holiday season.  1. People are Distracted  You know that with all the holiday…

Read More

Airline Ticket Scams Are Soaring

Airline Ticket Scams Are Soaring Scammers love travel season. They know your eyes are peeled for a cheap ticket and have devised convincing ways to get their hands on your money. Tricked consumers have spent months of their lives dealing with the consequences of these scams and lost thousands of dollars in the process.   In…

Read More

What the MGM attack means to smaller companies 

What the MGM attack means to smaller companies Yes, the MGM attack was a big one, and these are the ones we always hear about, but what actually happened and why should your business be concerned?  The MGM Hotel and Entertainment Resorts were hit by a serious cyber-attack that morphed into a ransomware attack. But…

Read More

4 THINGS TO DO NOW FOR CLI 

Will The FCC’s New “Cyber Trust Mark” Improve Home Cyber Security? (Unlikely)

4 Things to do to Prevent Your Cyber Insurance Claim From Being Denied “Thank goodness” is probably what Illinois-based manufacturing company ICS thought about having a cyber insurance policy with Travelers Insurance after a data breach in 2022.But after claims investigators pulled out heir microscopes, they found that ICS failed to use multi-factor authentication(MFA) across…

Read More

Worried about AI taking over the world, or just your job? 

Worried about AI taking over the world, or just your job? I’ve seen many recent articles about Artificial Intelligence (AI) and the concern about it pulling at Skynet and taking over the world, but I think far more concerning to many is what jobs AI will take over and what will need to be done…

Read More

Exploring Cryptojacking: Understanding the Threat and How to Protect Against it

Exploring Cryptojacking: Understanding the Threat and How to Protect Against it In the realm of cybersecurity, the term “Ransomware” has haunted us many for years. However, a recent shift in the landscape has brought to light a recurrence of another threat – Cryptojacking. Cryptojacking, involves a hacker exploiting a computer’s processing power to engage in…

Read More

Business Continuity: Monsoon Season Preparedness for Companies in Southern Arizona 

Business Continuity: Monsoon Season Preparedness for Companies in Southern Arizona As the Monsoon season approaches in Arizona, it brings with it the potential for severe weather conditions, such as power outages, flooding, and internet issues. For businesses operating in the region, these natural occurrences can pose significant challenges to their IT infrastructure and daily operations.…

Read More

Back to school

Photo Attribution: Pixabay

Back to School? Photo Attribution: Pixabay Your employees (and perhaps you) are preparing for your kids to go back to school. You may be asking why this would concern your business IT. Well, here is the thing. We learned a lot during COVID, many people went to Work from Home environments and a lot of…

Read More