Make Me Cyber Safe

What Is A SIM Swap?

Introduction In today’s digital age, our smartphones are more than just communication devices; they are gateways to our personal and financial information. This makes them prime targets for cybercriminals. ...

Staying Safe from Scams in Collaborative Tools

Introduction From group chats to group projects, platforms and software designed to bring your office together have proliferated in the past decade or two. Maybe you use Slack or ...

How to Online Shop AND Stay Cyber-Safe

Introduction When is the last time you bought something via the internet? 2.64 billion people online shop in 2024. With the whole world connected, that’s about 1/3 of the ...

Secure and Productive Video Conferencing Solutions for Businesses 

Introduction No matter where you work, we’ll bet that you video conference on at LEAST a semi-regular basis, if not more often.   How often do you go to your ...

Pastejacking: Behind the Subtle Phishing Scam

Introduction It’s got nothing to do with glue…pastejacking is a serious threat which has increasingly targeted unsuspecting internet denizens. In reality, this dangerous scheme is just another iteration of ...

Business Email Compromise On the Rise

Introduction Business Email Compromise, or BEC, is no longer a whisper in the corporate world. It’s a full-blown scream, echoing through departments in every industry. Shockingly, it was the ...

The TikTok Chase Bank Glitch: A Lesson in Cybersecurity

Introduction The recent TikTok trend, dubbed the “Chase Bank glitch,” serves as a stark reminder of the dangers of unverified financial advice on social media. While the claims of ...

How Microsoft Copilot Got Hijacked

Introduction Have you heard about the recently patched vulnerability in Microsoft 365 Copilot, which exposed sensitive data through a novel AI-enabled technique called “ASCII Smuggling?” This technique uses special ...

Cyber Extortion Is NOT Just a Concern for Your Boss

Introduction Cyber extortion…it’s exactly what it sounds like. This form of cybercrime occurs when attackers gain unauthorized access to a company’s sensitive data or systems and then demand a ...

Real Site or Typosquat? Here’s How to Tell

Introduction What if you click on the link by mistake, or simply because you don’t stop to more carefully examine the email? Then, we run into another problem: Typosquatting.  ...

Contact

Managed IT SolutionsManaged IT Solutions Logo $$$