Main menu


FBI Special Alert: QR Code Scam on the Rise

FBI warns that cybercriminals are modifying QR codes to redirect victims to malicious sites so they can steal login and financial information. 

FBI issues warning about Google Voice authentication scam

If you share your phone number online—and let’s face it, most of us do sooner or later—you run a real risk of being targeted by the slick Google Voice authentication scam, warns the FBI in a recent communication.

What are Double Extortion Demands?

red email icon with phishing hook through it

Ransomware operators are now frequently operating with a one-two punch: through the so-called trend of "big game hunting", once they have infiltrated a network, they move laterally through it with the aim of gaining as many access points as possible, maximizing the percentage of the environment under their control. After having operationally impacted a large percentage of server-side infrastructure, that's when they deploy the ransomware message. 

How Safe from Attack is Your VPN?

zombie silhouettes outside a home protected under a glass dome

What do zombies and malware have in common? Both are generally created by an infectious virus, spreading quickly and wreaking havoc. Work-from-home offices can be especially vulnerable, as they are often not given the same protections as your organization's network. So what should do *before* zombies—or malicious virus attacks—actually happen?

Coronavirus-related Scams Exploit WFH Vulnerabilities

hacker figure silhouetted against field of text

Research by ZDNet has shown that tens of thousands of new unique coronavirus-themed domains are being created on a daily basis. Unfortunately, research also points to 90% of those webpages as being scam sites, with the most likely purpose that of distributing malware. 

More worrisome news? Ransomware has shot up anywhere from 72%-105%. Brute-force attacks are up 400%.

Cybersecurity Techniques: Reactive vs. Proactive

Illustration of overhead highway signs indicating proactive versus reactive actions to threat detection

Think of proactive and reactive cybersecurity methods as before and after. Reactive strategies should be a component of your defense against hackers, while proactive strategies should form the foundation of your cybersecurity. Both are critical to your company’s defense.

Cybersecurity Expert to Present Session on Cyberthreats at ABE’s TechExpo

businessman clicking icon for cybersecurity shield

There is a war going on. A cyberwar, to be exact, with companies big and small under attack daily. As managed IT specialists, we spend a good portion of our time fighting against the villains of the web to keep people and corporate assets safe. We believe knowledge shared is knowledge gained in this fight. That’s why we decided to enhance our biannual TechExpo offerings with a session specific to cybersecurity and ransomware.

Password Managers: What You Need to Know

Illustration of padlock with caption 'Password' on a field of 0101 type

When you reuse the same passwords across the internet, all it takes is one hacked account for hackers to make the jump and access your email, bank, and other important accounts. The solution can be as easy as a password manager. But which one?

3 Tips to Improving Cybersecurity

Conceptual illustration of a padlock and connections against a digital pixelated background

Improving your business’s cybersecurity is a hot topic—and don't expect that to change anytime soon.

Tech Tips by ABE: 5 Ways to Stay Secure Online

1. Hook up to a network that you know: Free Wi-Fi is tempting, but be sure that you consider who is providing the connection. Public connections at the local coffee shop are usually unsecured and leave your machine open to outsiders. While these networks provide a convenience, there are risks to be aware of.