Scam of the Week: Beware of Voicemail Phishing Scams

If your organization uses online voicemail services, you’ve probably used links in notification emails to check your new messages. Lately, scammers are creating look-alike notification messages that trick you into giving up your login credentials. The fake voicemail notifications take you through a series of steps. They’ll first prompt you to click a link toRead More

The Modern Office and Connectivity: Why Access to IT Drives Today’s Businesses

As we discuss what makes the modern office function fluidly, we cannot overlook the importance of connectivity. While the end user sees only a portion of internet technology (IT) that actually exists, the fact of the matter is that IT is the driving force behind today’s modern business. Not only does connectivity allow employees theRead More

This Week in Breach: Quest Diagnostics

Exploit: Unauthorized network access Quest Diagnostics: Clinical laboratory company with operations in the United States, the United Kingdom, Mexico, and Brazil. Risk to Small Business:  Severe: A collection firm partnering with Quest Diagnostics encountered a data breach that directly impacted nearly 12 million of the lab’s patients. In response, Quest is partnering with a third-party cybersecurity organization toRead More

Scam of the Week: Think Before You Tweet

If you’ve ever used social media to make a complaint about a company, you’d know that many organizations are quick to respond to this public expression. But have you ever stopped to question whether the account responding to your concern is really someone from the company? Recently, fraudsters have taken to social media platforms toRead More

This Week in Breach: Checkers Drive-In

Exploit: Malware Checkers Drive-in Restaurants Inc.: Fast food chain operating in 28 states Risk to Small Business: Severe: Hackers successfully infected 102 of the company’s point-of-sale systems with malware that stole customers’ payment information. The restaurant chain has elicited the support of law enforcement authorities and third-party security experts to remove the corrupted software from their systems. They willRead More