Categories for Top 10

A New Phishing Tactic: Reply-Chain Attacks

Aug 29 2022

The reason phishing attacks seem to be mentioned time and time again is because they are still the number one tactic cybercriminals use for cyberattacks.  They are becoming more difficult to detect since cybercriminals continue to evolve their tactics.  The […] [Read More...]

The Dos and Don’ts of Cyber Security

Aug 8 2022

Companies, as well as their employees, play a large role in maintaining the security of the Cyber world.  After all, it is a known fact that people are the weakest link when it comes to Cyberattacks.   Here are some […] [Read More...]

How to Tell if Your Computer is Hit with Malware

Jun 28 2022

Once your company is hit with a malware attack, it can take weeks to recover.  Not only that, but sometimes computers are hit with malware without even knowing! The longer the malware sits on your system undetected, the more damage […] [Read More...]

New Vulnerability Hits Microsoft Office

Jun 2 2022

As a partner with Huntress, and an IT company of course, we feel it is our duty to pass along any important information they share with us.  There is a Microsoft Office zero-day vulnerability out there, called “Follina,” that can […] [Read More...]