Phishing emails are a well-known and mostly annoying daily reality for most of us and not surprisingly, the banking industry is one of the top targets of hackers. All banks have email security protections in place, and most of the phishing attempts are obvious and easy to avoid. These “scatter shot” or “spray-and-pray” attacks rely on sending a high volume of generic emails to catch a few bites from gullible targets.
Fear the Spear: How to avoid being a victim of spear phishing
By Mike Gilmore, RESULTS Technology Chief Technology Officer
RESULTS Technology has joined the National Cybersecurity Awareness Month (NCSAM) initiative, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to this year’s NCSAM theme of ‘Own IT. Secure IT. Protect IT.’ which encourages everyone to #BeCyberSmart through cybersecurity best practices.
Virtualizing your servers, networking devices, and other machines can drastically lower costs and dramatically shorten IT infrastructure deployment times. However, implementing this requires a lot of IT support expertise that can’t just be pulled off by regular technicians.
Mobile device security is paramount in today’s IT landscape. There are plenty of ways to be sure your employees are accessing data safely away from the office, but there is one solution we recommend considering: combining mobile security efforts with virtualization technology.
Almost every modern mobile device allows you to send and receive emails, download and upload media files, store data, and even close business deals. As mobile devices have become indispensable in everyone’s personal and professional life, the security risks have also increased — and backing them up has become more critical than ever. Malware on […]
Securing mobile devices is incredibly difficult. They often have privileged access to sensitive data that they connect to via unprotected network connections. Virtualization vendors are finding ways to include solutions to these problems in their products and they’re perfect for small businesses. Mobile device management and virtualization Simply put, mobile device management (MDM) is about […]