Customer Awareness Kit

Experts Warn of Attacks on Telecommuters

As more offices rely on working remotely, hackers are working to take advantage… An article review. As concerns over the coronavirus continue to mount, more Americans than ever are working remotely from their homes…and hackers are looking to take advantage ...

The Public Has a Cybersecurity Awareness Problem

A new study shows most Americans fail to understand basic cybersecurity concepts… An article review. Considering that many of us live in a world where cybersecurity related subjects are commonplace, continuing awareness programs may sometimes seem excessive…...

The Evolution of Phishing

As user awareness grows, criminals are changing their tactics… An article review. First, some good news: Users are becoming more aware of phishing attacks, especially high-ranking users such as executives. Unfortunately, the bad news is that criminals are aware o...

Can We Trust Our Technology?

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In s...

“Reply-All” Email Incident Hits Microsoft

At its peak over 11,500 employees were ensnared in the email chain… An article review. When it comes to email awareness we usually focus on threats coming into our mailboxes from the outside world, like phishing scams. A recent incident at Microsoft, however, ser...

Data For Sale: How Anyone Can Locate Your Phone

Third party ‘location brokers’ are reselling data from carriers, and there may not be much you can do about it. An Article Review. For many years it has been common knowledge that your cell phone’s physical location can be identified–signal tria...

R-7 – The Top Seven Risks – 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a li...

Legacy Devices Pose A Security Risk

Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and...

FTC Releases New Cybersecurity Guide

Focused on small businesses, the guide covers twelve topics you need to know to be secure… An article review. While there are many resources concerning cybersecurity out there, it can sometimes be difficult to find information tailored for smaller organizations i...

The Rise of “Shadow Data”

Even if you haven’t ever used Facebook, your friends and family may have already let them build a profile on you… An article review. For this week’s review we had initially planned on using this interesting piece from Brian Krebs, about the dangers of...