Foreign Hacker Steals Nearly Half a Million From City of Tallahassee
Foreign Hacker Steals Nearly Half a Million From City of Tallahassee
The Tallahassee Democrat reported on April 5th that a large sum of money had been stolen from the city of Tallahassee’s employee payroll. The perpetrator is suspected to be a foreign hacker. What was stolen in the hack? The breech diverted approximately $498,000 from the city payroll account. Still, all city employees have received their earned paychecks. This […]
Read more
New Whaling Schemes: CEO Fraud Continues to Grow
New Whaling Schemes: CEO Fraud Continues to Grow
In previous years, the first clue that your corporate email has been compromised would be a poorly-spelled and grammatically incorrect email message asking you to send thousands of dollars overseas. While annoying, it was pretty easy to train staff members to see these as fraud and report the emails. Today’s cybercriminals are much more tech-savvy […]
Read more
Staying Safe Online: Are You the Target of a Fake Check Scam?
Staying Safe Online: Are You the Target of a Fake Check Scam?
Great news! You’ve posted a batch of pricey items from your business on Craigslist, and someone has offered to purchase the lot. However, when you receive the check you realize it’s not for precisely the right amount. Perhaps you contact the seller to get a revised check — and they are so accommodating that they […]
Read more
4 Questions Every CEO Needs To Ask About Cybersecurity
4 Questions Every CEO Needs To Ask About Cybersecurity
With the ever-increasing rate of digital interconnectedness and accessibility, IT systems are more at risk of attack by hackers and spies than ever before. Yet, many companies still haven’t seriously addressed the issue of cybersecurity in their organizations. If you have concerns about the preparedness of your business, now is the time to start taking steps to protect your data. A […]
Read more
Is Ransomware A Threat to My Business?
Is Ransomware A Threat to My Business?
What is ransomware? Ransomware is an unusual type of threat because it holds your files for ransom while leaving your systems essentially otherwise operational. A piece of malicious software enters your network and applies an encryption algorithm to your computer files, rendering them unavailable. The files are still there, and you can see them in a file […]
Read more
pixel-geo