SIM Card Hijacking Scams: What They Are & How to Protect Yourself

sim hijacking

(3.5-min read) Cybersecurity threats are always after your information. Fortunately, there are many new methods of keeping threats at bay, such as two-factor authentification. As we’ve discussed before, two-factor authentification requires a secondary form of identification before access is granted to specific accounts. The primary second factor many choose is a text message or phone…Read Full Article

Construction Companies Not Immune From Cybersecurity Attacks

construction and cyber security

(4.5-min read) There is a popular misconception that exists within many industries—that they are either not large or important enough to justify a cyber attack. The pervading mindset within these industries is one of, “why would a cyber threat be interested in my organization when there are so many other more lucrative targets out there?”…Read Full Article

Suspicious Cybersecurity Events Up 100,000% in Trucking Industry

cyber-security-in-trucking

(3.5-min read) If you had to wager a guess as to the industries most susceptible to cyber risk, would you guess that trucking would fall into that category? These were the findings reported at the American Trucking Association’s Management Conference & Exhibition in October of 2019. In under four years, the risk of suspicious cybersecurity…Read Full Article

What are Black Hat, White Hat, and Grey Hat Hackers?

black hat gray hat white hat hackers

(3-min read) What is your gut reaction upon hearing the word “hacker”? If you’re like most, there’s likely a negative response. Though hackers have been traditionally viewed in a bad light, not all hackers have malicious intent. Some hackers are even people you may want to hire!  As cybersecurity threats increase, so too has an…Read Full Article

Brute Force Attacks Explained Using the Plot of “Oceans 11”

roulette table in las vegas

(4.5-min read) Disclaimer: While we acknowledge that neither Brad Pitt nor George Clooney’s characters in “Oceans 11” were, in fact, password-guessing computer systems, reference to their actions is for the sake of illustration.   There are a variety of immensely sophisticated ways to compromise modern encryption systems protecting your company data. These are the equivalent of…Read Full Article

4 Reasons to Reconsider Technology Usage While Driving

texting while driving

(4.5-min read) With a new year comes the perfect opportunity to reevaluate many of our behaviors and determine if they are serving us or not. Despite our contrary thinking, one practice that definitely is not serving any of us is the use of mobile devices while operating a vehicle. According to the National Highway Traffic…Read Full Article

3 Questions to Ask Yourself Before Indulging in New Technologies

buyers remorse with credit card woman orange shirt computer

(4-min read) “Neat” does not equal necessary. It’s difficult to watch television, online videos, or scroll any social media pages without being bombarded by advertisements for the latest techno-gadgets, apps, and digital services. Advertisers want you to feel as though the device in your pocket is akin to a dinosaur bone and that if you…Read Full Article

IT Chats: Managed Network Service Considerations, Part 1

concerned man at computer

(4-min read) There is a common saying, “You don’t know what you don’t know.” All too often, we can’t achieve the right answers if we don’t know the right questions to ask. Let’s take a look at five managed network considerations that IT departments should be able to answer. 1. Diversification of Encryption Data encryption…Read Full Article