Anatomy Of A CEO-Wire Fraud Attack

CEO-Wire Fraud is a dangerous Social Engineering attack that cost businesses billions in losses. A good Social Engineer will study potential victims sometimes for months before attacking and craft convincing spoofed emails, targeting accounting personnel with wire transfer responsibilities. Recently, one of our best clients experienced such an attack and they graciously allowed us to use […]

Vigilance Is King In Cyber-Security

Introduction To those that are looking for that one security application that will provide total protection, I hate to burst your bubble—there isn’t any. Security apps are important and EVERY individual and business must use them, but you simply cannot rely on them to keep you completely safe. Vigilance is the key to overall safety. […]

Webinar – 5 Keys to Creating a Disaster Recovery Plan for SMBs

Every year, disasters strike businesses all over the world. These disasters come in many forms, from natural (hurricanes, blizzards) to virtual (hackers, CryptoLocker) to unavoidable (human error, hardware failure). So what can you do to prepare your business for the inevitable? XSolutions has partnered with Datto and disaster recovery expert, Donna R. Childs, for a […]

It’s Time For Small Businesses To Take Action

Introduction Not a single day goes by without reading about another hack, data breach or research showing how vulnerable some of our internet-enabled, everyday devices really are. Followers of XSolutions’ Company LinkedIn page as well as my 1700+ personal LinkedIn connections have been treated to articles on topics involving: Infected Google Play Apps Smartwatch security […]

Criminals Go Back To Work After The Holidays

Introduction It looks like the criminal element enjoyed their holiday break and now are returning to work with renewed vigor. Security firm, Heimdal explained in their recent post, “Security Alert: Exploit Kits Activity Spike Packs Improved Payloads, New Servers and a Predilection for Flash Player” that there has been a substantial increase in Neutrino, RIG […]

7 Things You Must Do To Avoid Becoming A Scareware Victim

The problem The internet can be a scary place, especially to trusting people. It is no secret that hackers, thieves, and scammers use the web because they can “hide in plain sight” behind fake user names and bogus organizations, stealing people’s money with very little to fear from the authorities (at least so far). One […]

10 Critical Steps To Take To Protect Yourself From Malicious Emails

Introduction The cyber-criminal’s main tactic of spreading infectious payloads is spam. With the dawn of the Internet of Things (IoT) where every device is being connected to the internet, the spam problem is growing by leaps and bounds. Hackers are now able to penetrate the paltry cyber defenses of household appliances, internet-enabled TVs, baby monitors, […]

Businesses Use Social Media At Their Own Risk

I understand that using social media for business is a controversial subject, but there is no denying that this very popular area of the internet is riddled with cyber-crime. Hackers targeting individuals and companies alike get a lot of information from the various social media platforms. A favorite ploy of criminals is to befriend a […]