Awareness Messages

Why Are School Districts The New Favorite For Hackers?

A lack of funding and IT staff makes for an inviting target… An article review. While it seems like everyone from individuals to major corporations are targeted by hackers these days, one group has been targeted with increasing frequency—and success: school distr...

Interns Present New Social Media Risk

A new generation of interns may open organizations up to new risks… An article review. If you’ve been paying attention to the world of breaches and other security lapses over the years, the idea of the “insider threat” is probably nothing new—your own employees c...

The Evolution of Phishing

As user awareness grows, criminals are changing their tactics… An article review. First, some good news: Users are becoming more aware of phishing attacks, especially high-ranking users such as executives. Unfortunately, the bad news is that criminals are aware o...

Keep Your Software Up To Date!

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here:

Why The Polar Vortex Wasn’t So Bad After All!

Winter weather does its part to help catch a robber… An article review. This time of year the winter weather can get anyone feeling down, so when our friend Joe Cychosz sent us this humorous article we felt like we had to pass it along! It seems that a bank robbe...

Can We Trust Our Technology?

A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In s...

“Reply-All” Email Incident Hits Microsoft

At its peak over 11,500 employees were ensnared in the email chain… An article review. When it comes to email awareness we usually focus on threats coming into our mailboxes from the outside world, like phishing scams. A recent incident at Microsoft, however, ser...

Data For Sale: How Anyone Can Locate Your Phone

Third party ‘location brokers’ are reselling data from carriers, and there may not be much you can do about it. An Article Review. For many years it has been common knowledge that your cell phone’s physical location can be identified–signal tria...

R-7 – The Top Seven Risks – 2019

Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . When Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a li...

Legacy Devices Pose A Security Risk

Devices like fax machines and copiers are often classified as office supplies and slip past IT scrutiny… An article review. Despite all the advances in technology, most offices still generate large volumes of printed documents, and the devices used to produce and...