Phishing Scam: Contact Form Submissions
You are probably familiar with the concept of phishing, or e-mails that trick you into giving your personal information (credit card, social media logins, etc.) by posing as legitimate businesses …
You are probably familiar with the concept of phishing, or e-mails that trick you into giving your personal information (credit card, social media logins, etc.) by posing as legitimate businesses …
It is common knowledge that everyone should have a unique password for each login. Let’s be realistic though— you probably use variations of the same 2-3 passwords. Hi, Pot, I’m …
What is a VPN? When you leave your home/get out of the car, you lock the doors, right? Similarly, protecting your information online is just as essential. We should protect …
Have you ever seen Facebook ads on things that you never searched for on your phone, but DID talk about? Facebook says they don’t eavesdrop on you, but many folks …
What are skimmers? Skimmers harvest your credit card info from your card without you knowing it. How? It sits on top of the real card reader, hidden in plain sight, …
When was the last time you thought about your antivirus software? How long have you been putting off the update reminders? If you feel personally attacked by these questions, let’s …
We get asked a lot what AV (anti-virus) programs we recommend. Here’s our current recommendations as of June 2016: Avast Anti-Virus The free version of this is quite good. Our …
Why does this Matter? The main issue at stake as I see it is not a hack of an iPhone. That can be done, has been done, and will be …
Are your friends telling you they are getting spam emails from you? Are you getting bounce notices from emails you didn’t send? Your email has been hacked. How did this …
Why would your business need a Computer Usage Policy? First, we all blow a little bit of time every day surfing the web at work. Can you fire someone for …