Gmail had a rough week this week as many people fell for a phishing scam that took over Gmail accounts all over the country. With our hyper-vigilant world we currently live in, why was this particular email's validity so convincing for people? More importantly, how...
Chad Gniffke
Social Engineering – Attacking Cyber Age with the Oldest Trick In the Book
Social engineering is arguably the most unique form of cyber-attack. While most attacks rely heavily on IT skills and technology-based hacking tools, these make use of one of the oldest tricks in the book. Social Engineering in a Nutshell Despite what its name seems...
Understanding the Value Skype for Business offers SMBs
Skype for Business ups the ante on the already impressive online collaboration capabilities of Office365. In this post, we’ll explain to you what Skype for Business is, what it brings to Office 365, and where its value lies for small businesses. If you’d like to...
Why Ransomware Is A Serious Threat To Your Business
Ransomware is arguably the most notorious malware these days. It has crippled countless systems across organizations. One of the most recent ransomware attacks managed to briefly paralyze the office of California State Senator Bob Hertzberg, who happens to be the...
Benefits of Moving to Office 365 Aside from Cost
Office 365 might be more affordable than the up-front licensing cost of its predecessors, but there’s far more benefits to it than just its price. From keeping all your files in one convenient location to providing better security, here are some benefits of having...
7 Steps To Mitigate Cyber Security Incidents
The risk of a cyber security attack are on the rise. Last March, a jury awarded Irvine-based lender Mount Olympus Mortgage Company around $25 million in a lawsuit involving stolen loan files, personal information, and other sensitive data. The files were...