QR Codes
These are EVERYWHERE now. Be aware that anyone can create QR codes, and they are trivial to place in public areas. An attacker could send…
These are EVERYWHERE now. Be aware that anyone can create QR codes, and they are trivial to place in public areas. An attacker could send…
We see stolen credentials time and time again for MS 365. The 2021 Verizon Data Breach Investigations Report shows that 61% of breaches involved credentials….
Initial info on the “CMMC changes” we’ve been hearing about is here. I’m glad to reflect on taking the common sense route from the start…
Our friends at Cybercrime Support Network are working hard to compile a catalog of resources to assist survivors of cybercrime on their road to recovery….
10 Week Virtual Program – 1 hour weekly sessionsTo meet the needs of individuals impacted by romance imposter scams, Cybercrime Support Network has developed a…
Everything depends on your domain name. How are you protecting it? -Who is (whois!) your registrar?-Who has access to your account?-What email address is associated…
Phishing emails or text messages may appear to come from a company you trust and claim that there is a problem with your account or…
Check out this great list of Do’s and Don’ts for wireless devices. Securing Wireless Devices