Regular cyber security training is vital for everyone, no matter the role you play or the industry where you work. Cyber Security threats are growing and evolving faster than ever. For small and medium-sized businesses (SMBs), a single breach can have devastating consequences—not just financially but also in terms of reputation and customer trust. Approximately […]
Cyber Safe Focus: Sheri the Magnificent
Sheri, the magnificent here. Inspired by Johnny Carson’s, “Carnac the Magnificent,” I want to try my hand at making predictions. Here we go… today’s magical, mystical answer is… 1,2,3,4,5,6 What is at least one of your passwords? That may sound funny unless you are one of the millions who use the same password! 1,2,3,4,5,6 is […]
How Port-Out Fraud Took Down AT&T
In early 2024, a group of sophisticated fraudsters hijacked the phone numbers of dozens of AT&T customers with reportedly high net worth and launched a port-out fraud cyber attack. By gaining control of these numbers, the criminals intercepted multi-factor authentication codes to access the victims’ financial accounts, primarily focusing on cryptocurrency holdings. Losses are estimated […]
Cyber Safe Focus: Cyber Safe Holiday Online Shopping
Happy holidays to the cyber criminals hoping to mine your data while you do holiday online shopping on these cold winter nights. That’s right, research shows a 30% increase in ransomware attacks during the holiday season compared to the rest of the year. Why is that? Cyber criminals take advantage of the fact that many […]
Guardians of the Network: Understanding Firewalls
In our digital lives, whether banking online or catching up with friends, a lot is happening behind the scenes to keep our devices and data safe. Firewalls are a major player in this protection. Even if you’re not in a tech role, understanding what a firewall does and why it’s important can help you make […]
Hijacked: The Rising Menace of the SIM Swap and How to Protect Yourself
Our smartphones are more than just communication devices. They are gateways to our personal and financial information, making them prime targets for cybercriminals. One particularly insidious method they use is the SIM Swap attack. A SIM Swap attack, or SIM hijacking, occurs when a cyber criminal tricks your mobile carrier into transferring your phone number […]