Security

Dark Web Monitoring – Is It Worth It?

The name alone sounds pretty impressive.  A recent service offered by security companies to scan the dark web for your personal information. Since the dark web is a place where lots of cybercriminals conduct business, it makes sense to monitor this, right? First, what is the dark web? Most of [...]

By |2020-12-28T12:13:02-05:00March 25th, 2019|Categories: Advisory, News|Tags: |

Recent Security Flaws Detected in Computer Chips

THREAT: Two security flaws have been discovered that affect nearly all microprocessors, the digital brains of the world’s computers. Dubbed Meltdown and Spectre, these major security flaws found in microprocessors are causing havoc amongst tech giants.  Up against the clock, experts are working to create patches to fix this problem [...]

By |2018-01-11T16:44:34-05:00January 11th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

Celebrate World Backup Day!

March 31, 2017 marks the sixth anniversary of World Backup Day.  Six years of generating awareness about the importance of protection from data loss and doing data backup.  Don’t be an April Fool – be sure to back up your data this Friday! Leading Causes of Data Loss Hardware Malfunctions [...]

By |2018-01-02T12:38:54-05:00March 29th, 2017|Categories: News|Tags: , , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Beware of “The “HoeflerText” font wasn’t found” scam

Hackers have crafted a new Google Chrome scam that could infect your computer with malware. A popup, which contains the message “The ‘HoeflerText’ font wasn’t found,” urges users to download an updated “Chrome Font Pack” to their computers. The update, however, is actually a malware download. How You Can Avoid [...]

By |2018-01-02T12:57:52-05:00February 27th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |
Go to Top