Skip to content

Cybersecurity / IT Audit and Consulting

Category: Uncategorized

Uncategorized

Outlook Calendar’s Dangerous Design Flaw Everyone Should Be Aware Of

May 5, 2021 Elizabeth White

A New Form of Phishing Email is an essential part of daily life for most of us, no matter our industry or profession. Still, like the rest of the Internet, it comes with inherent risks we should all be aware of. Phishing, or hacking by email, can occur when we receive an email with a… Continue reading Outlook Calendar’s Dangerous Design Flaw Everyone Should Be Aware Of

Uncategorized

Be Aware of SIM Swap Attacks

March 2, 2020 Chad Gutschenritter

Phone number theft is more possible – and prevalent – than you might think. Hackers are deploying attacks known as SIM swap attacks and the damage might be more than you would expect. This article discusses everything you need to know about SIM swap fraud and how to better protect yourself. The SIM card inside… Continue reading Be Aware of SIM Swap Attacks

Uncategorized

SPF, DMARC, and DKIM

January 29, 2020October 21, 2020 Dylan Koenen

Sender Policy Framework (SPF) The Sender Policy Framework (SPF) is a technique that is used for email-authentication which helps prevent spammers and social engineers from sending messages on behalf of your domain(s). Organizations can publish their authorized email servers on an SPF record in the Domain Name System (DNS). These records include a list of… Continue reading SPF, DMARC, and DKIM

Uncategorized

Block TAR Files

January 7, 2019 secureguard

A recent vulnerability was reported involving TAR files. TAR is short for tape archive. It’s used, similar to .zip files (similar but not the same) to store multiple files as a single file and is used mostly in Unix or Linux environments. On a Windows machine, TAR files can be opened using a common piece… Continue reading Block TAR Files

Uncategorized

USB Security Risks to All Companies

June 26, 2017 secureguard

Now that we’ve covered phishing, in this next set of blogs, we’re going to start looking at some of the other various methods hackers use to compromise systems and protective controls that you can implement to keep yourselves safer.  In this blog, we’ll explain the risks associated with using USB or flash drive media. Bullet… Continue reading USB Security Risks to All Companies

Uncategorized

A Short Primer on Spear Phishing

August 1, 2016December 27, 2018 secureguard

One of the most common ways that you can discern if an email is a phish is by checking the sender. If it is someone that you don’t know, or it is about something you did not expect, you don’t click on the email. Spear phishing is a way that attackers can get around this… Continue reading A Short Primer on Spear Phishing

Uncategorized

Beware of Ransomware

August 1, 2016December 27, 2018 secureguard

Imagine if your computer looked like this the next time you booted it up. This is one example of the effects of ransomware on a computer. Ransomware is a type of malware that blocks or encrypts files on a target’s computer unless they pay a ransom to the attacker to unlock it. Many targets are… Continue reading Beware of Ransomware

Posts

  • Outlook Calendar’s Dangerous Design Flaw Everyone Should Be Aware Of
  • Be Aware of SIM Swap Attacks
  • SPF, DMARC, and DKIM
  • Block TAR Files
  • USB Security Risks to All Companies
  • Phishing – Are you Susceptible? (Part 6) – Summary
  • Phishing – Are you Susceptible? (Part 5)
  • Phishing – Are you Susceptible? (Part 4)
  • Phishing – Are you Susceptible? (Part 3)
  • Phishing – Are you Susceptible? (Part 2)
  • Phishing – Are you Susceptible? (Part 1)
  • A Short Primer on Spear Phishing
  • Beware of Ransomware
Proudly powered by WordPress · Theme: Button by Automattic.