Business email compromise

How Business Email Compromise Attacks Work

Business Email Compromise attacks involve cybercriminals sending an email pretending to be a trusted source. The cybercriminals will request funds, account numbers, and confidential information. Attack examples include bogus invoice schemes, CEO fraud, account compromise, attorney impersonation, and data and W-2 theft.

Read more
cryptojacking

Cryptojacking: The Latest Major Cyber Threat

Cryptojacking is defined as the unauthorized use of someone’s computer to mine cryptocurrency. The rise in cryptojacking activities is largely due to the increase in the value of bitcoin and other cryptocurrencies. According to McAfee Labs, the count of total coin miner malware rose by 629% in Q1 of 2018 alone, to more than 2.9 million samples.

Read more
office 365 password theft

Scam Alert – Microsoft 365 Password Theft

There has been an increase in phishing emails to our customers pretending to be from Office 365. These scams are designed to trick users into sending their usernames and passwords to untrusted sources. Cyber thieves can use your email account to conduct fraudulent activities and steal funds from your business.

Read more
cryptocurrency cyber scams

Watch Out For Cryptocurrency Cyber Scams

A cryptocurrency is an anonymous digital currency tracked in an online public ledger. To investors, each initial coin offering (ICO) of a new cryptocurrency may be the moment they strike it rich. Sadly, the hype over cryptocurrency investing is another chance for con artists to steal money from people.

Read more
Tax Identity Theft Awareness Week

Tax Identity Theft Awareness Week

The IRS’s tax filing season is a prime time for identity thieves to steal money. The FTC states that tax identity theft occurs, “…when a person uses someone else’s Social Security number to either file a tax return and claim the victim’s refund, or to earn wages that are reported as the victim’s income, leaving the victim with the tax bill.”

Read more

Subscribe to Newsletter

* indicates required