Free Internet Access? Don’t fall for this one

Regina Christensen Perspectives Leave a Comment

One of the popular internet scams that has been doing the rounds since 2017 is the one about “Free Internet”. This scam seems to resurface and somehow manages to claim quite a few unsuspecting victims. Here’s how they catch you. Ads are created on Google, Facebook, popular search engines and social media platforms advertising free internet hours. The ads look …

Cybersecurity & Compliance for Dental Practices

Sebastian Abbinanti Webinars Upcoming Leave a Comment

July 10, 2020 Dental practices have to adhere to HIPAA and PCI compliance standards. Ensuring your technology is adequately set up for compliance is only the first step. This webinar will focus on the steps Dental Practices must take to stay compliant and avoid data breaches and other cybersecurity threats.  Register here!

Online shopping? Watch out for these red flags

Regina Christensen Perspectives Leave a Comment

Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. It doesn’t matter if it is too hot to venture outside or if there’s a blizzard out there, you do your shopping from the comfort of your couch and the stuff …

DNS Cache poisoning: What every SMB must know

Regina Christensen Perspectives Leave a Comment

In one of the most common poisoning attacks, the attacker poisons the DNS Cache with the aim of leading visitors to a fake website. In a DNS cache poisoning case, the attacker gains control of the DNS server and then manipulates cache data such that anyone typing the URL of the actual website is redirected to the fake one. This …

Protecting yourself against poison attacks

Regina Christensen Perspectives Leave a Comment

Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve Here’s what you can do to ensure such access is prevented. The data poisoning attacks discussed above adversely …

Poison Attacks: A quick overview

Regina Christensen Perspectives Leave a Comment

Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming a commonplace. With technology becoming smarter every minute, the risks are increasing by the minute as well. Cybercriminals are finding new ways to corrupt our IT networks to disrupt our businesses, hold our data hostage and even …

Employee training and Cybersecurity

Regina Christensen Perspectives Leave a Comment

Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee training best practices that you can make a part of your cybersecurity training program. Create an IT policy handbook Make sure you have a …

Strengthening your cybersecurity policies

Regina Christensen Perspectives Leave a Comment

Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from becoming a victim of cybercrime. In this blog, we explore the various areas your IT policy should ideally cover. Passwords: Your IT policy should cover Rules regarding password setting Password best practices The implications …