Fighting Cyber Threats in Challenging Times

Fighting Cyber Threats in Challenging Times

Fighting Cyber Threats in Challenging Times The greatest outputs of small businesses during challenging times are often innovation and organizational change. Although many of you are struggling just to keep the doors open during our current COVID-19 (coronavirus)...
What is SIM Swapping?

What is SIM Swapping?

SIM (Subscriber Identity Module) swapping is a major cell phone industry-wide problem and is growing. Simply, a criminal calls a wireless company claiming to be the owner of your number and that they have purchased a new cell phone. They ask the company to activate...
Business Background Checks

Business Background Checks

How can you tell if a business is one you want to do business with? Both businesses and consumers want to make sure the companies they choose to do business with are legitimate and won’t rip them off. However, businesses don’t have the same protections consumers have...
How to Guard Against Spearphishing

How to Guard Against Spearphishing

If you have ever received an email telling you to verify your email address or account information, especially with an organization where you have no such account, you have seen phishing. Many would-be scammers blanket email accounts in hopes that a small percentage...

How to Avoid an Email Phishing Attack

Phishing is a hacker’s easiest method of gaining access to your computer, network, and personal data.  Phishing is most common via an email sent with a file or attachment although there are other methods such as via social media, websites or even via phone text or...