Social Engineering Tactics Cybercriminals Use

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.

In this Fulcrum security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for.

Ransomware – Before, During & After

Before During and After Ransomware attacks

We all have heard of one of the most popular cyberattacks used in today’s business environment – ransomware. What type of attack it is, how it is obtained, how to get it off your machines if you’re attacked, and how to prevent it from happening to your organization – we’ve got answers for you! Watch our quick video here, or see our Q & A below.

Employees Most Susceptible to Phishing Attacks

We might be prone to considering breaches caused primarily by cybercriminals hacking corporate networks. But data show - especially in the case of phishing attacks - are most often facilitated unknowingly by employees or insiders. In fact, the most recent Verizon Data Breach Investigations Report (DBIR) revealed that 30 percent of breaches are caused by an internal actor.

Use the “SLAM” Method to Spot Phishing Emails

This video will reiterate how important it is that you and your employees are well-trained to spot malicious emails. In a nutshell, you can use the SLAM Method to help quickly identify suspicious emails.

Sender – Check the sender closely. Look for misspelled domains, or a completely different email address than the name of the sender.

What is juice jacking, and why is it dangerous?

Smartphones help us complete various work and personal tasks, and, depending on our usage, we may need to recharge them several times a day. But when your charger is unavailable and you need power for your phone, charging at public kiosks can seem like a good substitute. Here’s one good reason why you shouldn’t plug […]

Global Cyber Threats Growing Against US Government & Business

At the end of a challenging pandemic year, news has come to light about recent cyber assaults against US government agencies, government contractors, IT companies, Think Tanks, and other businesses in 2020.  These attacks illuminate the ways that the cybersecurity landscape continues to evolve and become even more dangerous.

What are two-step and two-factor authentication?

Some data breaches result from the theft of a user’s login credentials. To keep your business safe, you need to implement a two-factor or two-step authentication process. These authentication methods may sound the same, but they are two vastly different processes. Read on to learn the differences between two-step authentication and two-factor authentication. If you […]

Small- and mid-sized businesses need cybersecurity

If your company has recently suffered from a data breach or a ransomware attack, then you know how costly it can be. You lose not just hundreds of dollars but also the reputation you’ve built through the years. That’s why you need cutting-edge cybersecurity solutions to protect your business from ever-growing cybersecurity threats. The good […]

Everyone’s role to play in proactive cybersecurity

As IT security consultants and managed service providers, we are business partners who provide clients with enterprise-level IT. We specialize in overwhelmingly intricate technology and keep ourselves abreast of the latest cybersecurity developments. However, as with all partnerships, you have a role to play, too. Here’s how you and everyone in your team can play […]