by Mike Foster | May 17, 2019 | Cyber Fraud, Cyber Scams, Email Security, IT Best Practices
Fraudsters can pretend to be an executive at a company to request wire transfers or gift card purchases. To reduce the chance of a message duping someone at your company: First, ask your IT team to configure your email system to embed a sentence at the top of the body...
by Mike Foster | Apr 23, 2019 | Alerts, Inpivx, Ransomware
There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. Do you know someone who doesn’t like your organization and would like to...
by Mike Foster | Mar 19, 2019 | Cybersecurity
Everyone is tired of getting those annoying phone calls. Sometimes the callers are people trying to steal your credit card numbers. Tools are available to help stop the problem. YouMail and RoboKiller are two of the apps that do the job. We do not get compensated for...
by Mike Foster | Mar 11, 2019 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, Protection Tools, RSA Security Conference, Technology Safety Tips
The RSA Security Conference is wrapping up today. I’ve been here all week, and almost all of the best security companies demonstrated their security protection tools. Guess what was missing? Mobile device protection. If more than 70% of all Internet traffic is...
by Mike Foster | Jan 25, 2019 | Cybersecurity, Hackers, Hacking Competition
Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays… $250,000 if they can hack the autopilot$100,000 if they can hack the modem or tuner$100,000 if they can hack the key fob or phone-as-a-key Microsoft, VMWare,...