target-bulleye-goal

Attended The CIANJ’s Forum On Alternative Sources of Working Capital

I had the pleasure of attending the Alternative Sources of Working Capital forum hosted by the Commerce and Industry Association of New Jersey (CIANJ) on Wednesday, July 26th at the Saddle Brook Marriott.
tablet-interface

Criminals Attack On A Global Scale

As you've undoubtedly heard, a second global ransomware attack…
Looking Closely For A Bogus Link

Security Through Reading Links

The bad guys are a smart bunch. They know most users are busy. They don't read very closely. Hackers will use this against you. Beware!
Malware Evolves To Dangerous Levels

Malware Evolves To Dangerous Levels

Hackers have evolved. Now that users are wary of opening attachments in emails, they've come up with new ways of attacking us.
woman with laptop in office

Sometimes Low-Tech is the way to go

If it's online it can be hacked. Here's a low-tech solution to the unauthorized PC and mobile camera surveillance problem.
Employee on cell phone

Anatomy Of A CEO-Wire Fraud Attack

CEO Wire Fraud is costing businesses billions each year. Social engineers stalk their victims for months before pouncing.
Email Phishing

Security Alert: NYS DMV Email Scam Going Around

An email pretending to be from the NY Department of Motor Vehicles is notifying people that they have outstanding tickets. It's a SCAM.
Fake call center worker

9 Online Shopping Security Tips To Keep You Safe

Over 50% of Americans prefer to shop at home. This is music to a cyber-thief's ears. They're just waiting to taker your money and identity.
security-network

Security Alert: DocuSign Breach Leads To Phishing Attacks

The bad guys are using Docusign look-alike emails to trick users into opening an infected email attachments.
tablet-interface

How To Identify A Phishing Email—An Example

Do you know how to identify a phishing email? Read this post as we look at a bogus email branded like an MSO365 communication.