As an MSSP, we offer a number of services. It’s kind of in the name. Two of those services involve email through both email security as well as end-user education through our phishing service. Over the last couple of weeks, we’ve noticed an uptick in phishing emails that ...
You may not realize it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon’s Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user level will keep ...
Infogressive’s engineers are a special kind of broken. We like to learn and put ourselves through things that are REALLY hard just because we’re curious… (and a little masochistic). When I was new to the company, I shadowed on an Incident Response lead by one of our vendor ...
How often does the average person think about cybersecurity?
Scam Alert – Cyber Monday is coming and scammers will take advantage! Savvy criminals are getting ready to celebrate the holiday season just like we are. The difference is, they plan to fund their holiday with your bank account. Hackers go into scam-overdrive mode during ...
U.S. warns about phishing attacks on nuclear, energy, aviation, water, and manufacturing industries. The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an ...
SCAM ALERT – Hackers are sending emails, falsely claiming your Netflix account has been suspended. These emails look just like the real thing. They are trying to get your login information and your credit card data.
What we know so far… Looks like there’s a new kid on the block in Ransomware today that is creating havoc for a number of organizations in Russia, Ukraine, Germany, and Turkey.
It is no secret that funds transfer fraud, aka Business Email Compromise (BEC) and Email Account Compromise (EAC), is on the rise for both businesses and consumers. These losses occur when a threat actor, through social engineering or computer intrusion techniques, can ...
It’s not fun, but it’s necessary. One of our very own Security Analysts recently proved why log review is a crucial step in protecting our customer’s networks.
11 Years Ago – Internet Explorer was the dominant web browser, Facebook was created, cell phones became video-capable, and our CEO began a mission to make small businesses' networks a safer place. 2006 – Infogressive, Inc. was founded in Lincoln, NE
You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.
When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives, and bankrupted businesses. What about White Hat ...
Passwords are important. Think of them like the keys to the 'locks' on your digital accounts. Having strong, secure passwords is critical.
SCAM ALERT – Bad guys are exploiting the Hurricane Harvey disaster. You may see messages on social media or you may even receive an email asking you to donate to #HurricaneHarvey. Scammers are sending fake links designed to take your money and prevent it from getting to ...