Information Technologies

How Vulnerable Are You to Cyberattack?

Threat and Risk Assessment is the First Step in Safeguarding Your Network —Michael Fowler Sophisticated networks of greedy, malicious cybercriminals are proliferating around the world and across the Internet. They constantly probe corporate and government networks of all sizes, looking for vulnerabilities they can exploit to steal data, identities, and money. Therefore, your organization must …

How Vulnerable Are You to Cyberattack? Read More »

SMS Phishing Is Even More Insidious Than Email Phishing

Most people spend a lot more time looking at their phones than at their desktop screens. Cyber-criminals know this, and they’re increasingly targeting their victims through SMS phishing, or “smishing.” “SMS” stands for “short message service” and is the technical term for the text messages you receive on your phone. In smishing attacks, criminals use …

SMS Phishing Is Even More Insidious Than Email Phishing Read More »

STIR SHAKEN HERE TO STAY

Winchester, VA: March 16, 2019 — According to YouMail Robocall Index, nearly 48 Billion Robocalls Made in 2018. This annoyance to both consumer and commercial users of the new IP enabled Public Switch Telephone Network (PSTN) is only going to get worse as bot technology gets more integrated with Voice over IP (VoIP) networks. Fortunately, …

STIR SHAKEN HERE TO STAY Read More »