What is Swatting and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What is Swatting and Why Should You Care?"

 

 
Swatting
What is it?
An attack centered around location sharing in which bad actors call the police claiming the victim has committed a crime…
 Bomb Threat
 Armed Intruder
 Violent Incident

Why should you care?
 Physical and immediate consequences
 Sometimes was intended merely as a prank
 Arrest and serious injury can result
 Reduce risk by sharing your location only with trusted individuals, and share vacation photos only after you’ve returned safely home

Tip - Your location is embedded as metadata in every picture you take with your
phone.

What is Phishing and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What is Phishing and Why Should You Care?"

 

 
Phishing
What is it?
Fake messages from a seemingly trusted or reputable source designed to convince you to…
 Reveal information
 Give unauthorized access to a system
 Click on a link
 Commit to a financial transaction

Why should you care?
 Extremely common
 Can have severe consequences
 Devil‘s in the details

Examples of Phishing include:

 Emails
 Text messages
 Phone calls
 Social media messages
and posts
 Suspicious hyperlinks

We've created some great resources and articles on how to stay cybersafe.

What are Physical Cyber Attacks and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What are Physical Cyber Attacks and Why Should You Care?"

 

 
Physical Cyber Attacks
What is it?
Physical cyber attacks use hardware, external storage
devices, or other physical attack vectors to infect, damage, or
otherwise compromise digital systems.

What are Bots and Why Should You Care?

During this Cybersecurity Awareness Month, today's blog answers the question, "What are Bots and Why Should You Care?"

 

 

BOTS
What is it?
Bots are a type of program used for automating tasks on the internet.

Why should you care?
Malicious bots can:
 Gather passwords
 Log keystrokes
 Obtain financial information
 Hijack social media accounts
 Use your email to send spam
 Open back doors on the infected device

Did You Know?
Not all bots are bad.

Educational Guide: 5 Steps To Improve Your Ransomware Resilience

Be prepared...Sooner or later your business WILL be attacked. Ransomware is the most terrifying data security threat your business has ever faced.

Imagine all your staff trying to login one morning. But all of them get a bright red screen saying your data has been locked away, and you must pay a huge ransom in Bitcoin to get it back.

Cybercrime Against Seniors: Phone Scams

Next in our Cybercrime Against Seniors blog series, we're going to explore Phone Scams. One of the most common way seniors are targeted by criminals is through phone scams. Common tricks include technology support scams, fake trip or lottery scams - or pretending to be a grandchild or loved one in need of money for an emergency.

Educational Guide: 10 Apps You Didn’t Know You Had in Microsoft 365

Microsoft 365 is full of awesome surprises waiting to be discovered. Wouldn’t it be great if someone wrote a guide to the best hidden apps in 365?

You're in luck!  We've prepared an easy-to-read guide for you this month, on the 10 Apps You Didn't Know You Had in Microsoft 365.

Please read and share with your teams and, as always, reach out to us with any questions you might have.