<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Company Exec Posers, Spread Spam

Posted by Steven Lai on Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai on Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

icloud-security 3 ways for best proctection-1.png  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Cybercrime Tweets

Posted by Steven Lai on Thu, May 11, 2017

Scammers are now using Twitter as their new platform. They use Twitter to lure in individuals looking for customer support, by interjecting themselves into legitimate conversations the customers are having with their Financial Vendors, and offering friendly chatter and a link that directs the customer to a Phishing page designed to harvest their financial credentials.

Fake Twitter help from scammers-1.png

Read More

Topics: Data Security, #BostonIntern, cybersecurity

What Data Discovery Tools do you need in 2017?

Posted by Robert Cordray on Mon, May 01, 2017

Data_Discovery_Tools 

Data has always been a driving force in the decision-making process for businesses. If you capture relevant information in the market, you can quickly make smart and strategic plans that can lead to growth and give you a competitive advantage.

There is high demand for more data, and this has significantly influenced the business landscape. As such, data discovering has emerged as the fastest-growing and changing trend of the business intelligence markets. Technology has enabled the manufacturing of tools that differ with the traditional systems of record in which the IT managed services provider was able to push reports out to the entire organization.

Read More

Topics: Data Security, data storage, data mapping

New Web Browser promises privacy

Posted by Steven Lai on Mon, May 01, 2017

A brand new web broswer promises privacy for web searching! The web browser is called Brave. The browser promises to provide an option that leaves no trace of or history to the web sites that have been visit.

Read More

Topics: Data Security, cybersecurity