Spoofing

Spoofing: an easy way to get hacked

Brett Harney Business Continuity / Disaster Recovery

The first thing you want to do is determine whether your account has been compromised by a virus, malware, or a spammer, or if you are just being spoofed. Email spoofing is when the sender of an email, typically spam, forges (spoofs) the email header “From” address so the email being sent appears to have been sent from a legitimate …

Network Security

Top 3 Threats to Your Network Security

Brett Harney Network Security

There is one assumption you must always make when it comes to protecting your network security: I am under attack, always. Never assume you can fly under the radar because your business is smaller than your competitors. You may be the exact target a cybercriminal is looking for; a victim who thinks they don’t need all the security measures of their larger …

IT security

8 Behaviors for a Strong Cyber Security Defense

Brett Harney Network Security

Cyber criminals are lurking everywhere, hoping to get a chance to exploit you.  It’s no secret that any person or business with an online presence is susceptible to being hacked or even lured into a scam.  The good news is that most spyware, malware and ransomware can be avoided with a few easy information security practices.