Major Impact Last week the Federal Aviation Administration (FAA) announced a nationwide ground stop of all flights. Approximately 9,000 flights were delayed, and over 1,000 flights were canceled. The reason why? The NOTAM system (short for Notice to All Air Missions), which is designed to provide real-time information to pilots and air traffic controllers with critical […]Learn More
What is Zero Trust?
Zero Trust Access Zero Trust, or Zero Trust Access, is the term applied to the strategy which assumes that you cannot trust the individual or device until verified. The good guys, the bad guys, and all devices are the same and should not be trusted automatically. Proof of trust is verified with credentials. The term […]Learn More
Staying Safe & Secure on Social Media
Did you know that an employee's sloppy social media habits can lead to a compromise that extends beyond the individual’s personal account? Many people don’t realize that their login credentials tie them together with an invisible thread in the dark web. A hacked social account could lead to access to business credentials or more. Hackers […]Learn More
Can Your Mobile Phone Get Infected with Malware?
Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is […]Learn More
What is a Deepfake?
A deepfake is a portmanteau (more on that in a moment) of “deep learning” and “fake”. What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If you take a photo, audio, or video and […]Learn More
What is a Botnet?
You may hear the word ‘bot’ used in conversations, especially around cybersecurity. But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network. It describes a network of computers that are infected by malware. This malware is controlled by a single party, […]Learn More
Social Engineering in Action
Is social engineering that effective? Ask an Uber or Rockstar Games employee that question and you’ll likely hear a resounding yes. This effective mode of duping people within a targeted group or business was the method that one hacker used to hit both companies with a breach. Just how effective is it? In 2021, the FBI received 323,972 complaints of social engineering attacks. And […]Learn More
Ransomware Attack on Los Angeles Unified School District
The Los Angeles Unified School District (LAUSD) has confirmed that a criminal hacking group was able to access their systems and steal data. The attackers demanded that the school district pay an undisclosed amount to prevent the release of the stolen data to the public. However, the district refused the ransom demands, stating that “Paying […]Learn More
Student Loan Scams
Student Loan Scams With the launch of the U.S. Student Loan Forgiveness program, there is an opportunity for students and other borrowers to benefit. Any scenario that puts millions of people in a target pool is ideal for hackers. Add to the scenario the list of questions and uncertainties and you have a recipe for […]Learn More
What To Do When You Have Been Hacked
Cybersecurity has never been more important than it is today. With so many of us working fully remotely online, and so many more of us working in a hybrid capacity, a huge proportion of our workspaces exist solely on the internet. That means that we are ever more vulnerable to the attempts of hackers and […]Learn More