Is Using Public WiFi safe?
Free Wifi is available in coffee shops, restaurants, shopping malls, hotels, airports, libraries -you name it. Millions of people everyday use this doing everything from browsing the internet, checking emails, and just any internet related tasks. Although, most people do not realize even though there is a password to login, free public Wi-Fi is not […]
Formjacking?
What is Formjacking? This is not a new form of cyber attack, but it has recently increased since the past year. It is form of JavaScript-code where cyber criminals hack and take control over the functionality of the site’s form page. This malicious JavaScript code is used to steal credit card details and payment form […]
IRS Scam Alert!
ATTENTION! ATTENTION! As April 15th approaches and many are stressed and worried about filing their taxes to the IRS. Although many people take this time of the year seriously, there are people who see this as a way to scam people out of money. It usually starts with a random phone call from a person […]
Apple Scam Alert!
Apple Scam Alert: There is a phishing scam that has been out for a while which actually spoofs Apple Inc. and it is designed to hoodwink you. It comes in the form of a phone call and/or email. It can start with an ‘automated’ phone call that display’s Apple’s logo, address and real phone number, warning about […]
Certbot – Upgrading outdated version and renewing Let’s Encrypt certificates
We recently ran into an issue where certbot was outdated and needed to upgraded to a newer version. In this process, we issued new Let’s Encrypt certificates, however it was only doing this for the www version of the site, rather than the non-www version of the site. This was a problem since all requests […]
Website Security Trends: November 2018
This month we are seeing something a little unusual in terms of malicious traffic- most of the time we see attacks originated in China or Russia however the activity we are seeing is originating primarily from the Philippines and some attacks from France. As a reminder, you should always use a very strong password (preferably […]
Defend against Hackers with Remote Monitoring & Management (RMM)
Even as businesses continue to invest in improving their technology infrastructure, they face the ever-present threat of IT failure known as downtime, any time that vital systems become unresponsive. Collectively, these periods of network inactivity cost businesses an estimated 127 million person-hours every year in lost productivity. NetworkWorld cites research firm Gartner placing the value of just one hour of […]
Protect your network by implementing DNSCrypt
The Internet Domain Name System (DNS) is truly amazing technology – without it, you wouldn’t be able to type in google.com and reach your destination. DNS was created to assist humans in having an easy address to remember server IP addresses. Think of it as knowing a street address instead of remembering the longitudinal coordinates […]
Mobile Device Management – Are you ready?
Do you remember when smartphones began showing up in the workplace over a decade ago? Whether they were company-provided smartphones or employee-owned smartphones phones, many business users were connecting to the corporate network without a hint of a mobile device management policy in place. This is a very dangerous practice, given that many do not […]
Protect yourself from WannaCry’s stealthier cousin Adylkuzz
If you’re a thief, would you rather bust through the front door, or quietly slip in the back and be in and out quietly and stealthily? Many cyber adversaries prefer this approach to stay undetected and keep a low profile. While the recent WannaCry ransomware attack was highly publicized, another lesser known malware called Adylkuzz has been […]