• July 10, 2025

    16 Billion Passwords Exposed in Recent Data Breach: Turn on 2FA!

    Data breaches keep coming, and the latest one revealed by Cybernews involves 16 billion passwords. There’s no way to know for sure if your passwords are included, though it’s always worth checking Ha... Read more
  • July 3, 2025

    Never Paste Unknown Text into Terminal!

    Here’s a new scam to watch for. A client reported running across a suspicious website masquerading as a human verification test. Instead of asking him to click pictures or solve a math equation, this one asked him to copy some text from the page and paste it into Terminal. The text was actually an encoded script that—if pasted into Terminal and executed—would have downloaded and installed malwa... Read more
  • June 24, 2025

    Consider Personal Cyber Insurance

    As digital threats become increasingly sophisticated, individuals need protection just as much as businesses do. According to the Federal Trade Commission, Americans lost $12 billion to fraud in 2024, with a significant portion coming from digital scams. While we’d all like to think we’re too savvy to fall for such schemes, even security experts can become victims: Troy Hunt, creator of theRead more
  • May 29, 2025

    Beware Domain Name Renewal Phishing Attacks

    Most phishing attacks are easy to identify, but we’ve just seen one that’s more likely to evade detection. Those who own personal or business Internet domain names—to personalize their email or provide an online presence for their website—may receive fake messages claiming that a domain has been deactivated due to a payment issue. Because scammers can determine when domain names are due to expi... Read more
  • May 20, 2025

    Consider Business Cyber Insurance

    When discussing digital security, we typically focus on preventive measures, such as using strong passwords with a password manager, enabling multi-factor authentication, keeping systems up to date, maintaining regular backups, and training employees to recognize potential security threats. While these practices are essential, they don’t guarantee complete protection. No one is immune to onl... Read more
  • May 15, 2025

    Why Every Business Needs an AI Policy

    Are employees at your company surreptitiously using artificial intelligence tools like ChatGPT, Claude, Copilot, and Gemini for everyday business tasks? It’s likely. An October 2024 Software AG study found that half of all employe... Read more
  • May 6, 2025

    Why Passkeys Are Better than Passwords (And How to Use Them)

    No one likes passwords. Users find managing them annoying, and website managers worry about login credentials being stolen in a data breach. The industry has developed a better solution: passkeys.

    Passwords versus Passkeys

    Traditional multi-factor authentication involves three methods of authentication, at ... Read more
  • April 29, 2025

    Security Precautions to Take While Traveling

    When we think about digital and device security, we mostly think about the fixed locations where people spend most of their time—home, school, and work. But what about when you’re traveling? Some security concerns remain the same when you’re on the road, but new ones crop up. We’ll assume that you already keep your devices up to date, use FileVault on Macs, have at least a six-digit iOS pass... Read more
  • April 15, 2025

    Don’t Assume That Top Google Search Results Are Guaranteed Safe

    We hate to encourage paranoia, but all is not well with Google Search. Recently, we’ve heard of multiple instances where people were nearly taken advantage of due to relying on the top result in a Google search. In one case, a user called a purported HP support phone number directly from the search results but ended up speaking with a scammer. In another, a user thought they were downloading th... Read more
  • March 18, 2025

    Never Save Your Work in These Locations

    In every job that involves interaction with the public, amusing “Can you believe…” stories about customers abound. They’re often triggered by seemingly reasonable behaviors that experts recognize as problematic. A well-known example from the early days of personal computing is a college student who kept track of his floppy disk by attaching it to his fridge with a magnet, not realizing that mag... Read more