Make Me Cyber Safe

Balancing Security with Data Privacy

Introduction We’re connected to the internet every day. When we check our social media on the train, or open a work brief over morning coffee, we’re actually putting our ...

All MFA Is NOT Created Equal

Introduction We’ve all heard the hype around multi-factor authentication. Also known as MFA, this function protects your accounts by requiring an extra measure of verification on top of your ...

What Is A SIM Swap?

Introduction In today’s digital age, our smartphones are more than just communication devices; they are gateways to our personal and financial information. This makes them prime targets for cybercriminals. ...

Staying Safe from Scams in Collaborative Tools

Introduction From group chats to group projects, platforms and software designed to bring your office together have proliferated in the past decade or two. Maybe you use Slack or ...

How to Online Shop AND Stay Cyber-Safe

Introduction When is the last time you bought something via the internet? 2.64 billion people online shop in 2024. With the whole world connected, that’s about 1/3 of the ...

Secure and Productive Video Conferencing Solutions for Businesses 

Introduction No matter where you work, we’ll bet that you video conference on at LEAST a semi-regular basis, if not more often.   How often do you go to your ...

Pastejacking: Behind the Subtle Phishing Scam

Introduction It’s got nothing to do with glue…pastejacking is a serious threat which has increasingly targeted unsuspecting internet denizens. In reality, this dangerous scheme is just another iteration of ...

Business Email Compromise On the Rise

Introduction Business Email Compromise, or BEC, is no longer a whisper in the corporate world. It’s a full-blown scream, echoing through departments in every industry. Shockingly, it was the ...

The TikTok Chase Bank Glitch: A Lesson in Cybersecurity

Introduction The recent TikTok trend, dubbed the “Chase Bank glitch,” serves as a stark reminder of the dangers of unverified financial advice on social media. While the claims of ...

How Microsoft Copilot Got Hijacked

Introduction Have you heard about the recently patched vulnerability in Microsoft 365 Copilot, which exposed sensitive data through a novel AI-enabled technique called “ASCII Smuggling?” This technique uses special ...

Contact

Managed IT SolutionsManaged IT Solutions Logo $$$