Posts for category: Best Practices

Romance Scams: True Deception

On February 12, 2019, The Federal Trade Commission (FTC) release an article warning of the dangers of the Romance Scams.  In a Romance Scam, cyber criminals gain the confidence/trust of their ...

Domain Name System(DNS)

DNS allows a user to type a Uniform Resource Locator (URL) into the browser which sends the user the requested website. In the background, DNS servers are communicating with each other to resolve ...

Email: Don’t Pass Go!

Businesses are highly affected by email scams. One scam reaching critical level is the W-2 scam.  The scam is aimed toward the HR department of an organization using sophisticated phishing ...

Access Control Models

Background – Considered one of the most crucial assets in a company, access control systems hold significant value. The term ‘access control’ refers to “the control of access to system ...

Password Manager

Background – Today, there are still people who use the same passwords across their online accounts. Often times, passwords are only changed when they are forgotten. Identity theft is a result ...

Data Breaches – What You Can Do

Background – A security incident where information is accessed without authorization is also known as a data breach. Data breaches are a costly expense that can hurt consumers and businesses in ...

SIM Card Identity Theft

Background- What is a SIM card identity theft? Basically, it is the stealing of your mobile identity. This fairly new way of identity theft/fraud is appearing everywhere. The list of attacks to ...

Incident Response Plan

Background- Cyber-attacks are becoming a more serious issue by the year. Today, there is no arguing with the facts: attacks are more frequent, sophisticated, widespread, and costly than ever. In ...

Biometrics Authentication (3FA)

Background- Sometimes two-factor authentication is not enough. By using “something you know” – username and password, along with “something you have” – hardware token, SMS, software ...

Protect Your Online Accounts with Two-Factor Authentication

Background- Majority of people today have many different online accounts like: Facebook, Instagram, Twitter, banking accounts, email, etc. Each of these accounts have information about your ...