Router

Should I Unplug my Router?

5/31/18

At our cyber security breakfast with FBI Agent Todd Munoz, one of the big questions that came up was how to protect against "Fancy Bear"--the hacker group, that has been using a malware program called "VPN Filter" to compromise home and small office routers made by Linksys, MikroTik, Netgear and...

Read More
Childish Gambino

Music x Technology: Childish Gambino

5/29/18

Teamwork is integral to any project. That’s why Childish Gambino used the latest technology to empower the teams working on his vision. At EnhancedTECH, we know you want to bring that level of collaboration to your employees. With Office 365, Childish Gambino’s teams achieve more by working...

Read More
BYOD Security

BYOD Security

5/18/18

Securing your BYOD policy Work practices have undergone a revolution in the digital age. Networked devices and more mobility have blurred the line between work and home as vast numbers of people perform their jobs across multiple platforms, often far from the office. An accompanying...

Read More
Mobile Phishing

Watch out for Mobile Phishing

5/16/18

Phishing on mobile devices? Yep, it's a thing. According to researchers at Wandera, phishing is the number one mobile threat affecting organizations. New research in Wandera’s Phishing Report 2018 shows that mobile users are 18x more likely to be phished than to download malware, and that 4000...

Read More
Encrypted Email

Encrypted Email Security Flaw

5/15/18

Think your business is safe because your emails are encrypted? Maybe not. A security flaw within email encryption looks like it has left a small opening for hackers to read your private messages. Called Efail by European researchers. the vulnerability doesn't break email encryption standards...

Read More
Password Stealing

Password Stealing Malware on FB Messenger

5/11/18

A variant of malware using fake Facebook Messenger messages to infect other users has re-emerged with new schemes to steal passwords, steal cryptocurrency and participate in cryptojacking. The scam was first discovered in August last year with the malware using phishing messages over Facebook...

Read More
2-Factor Authentification

Hackers Bypassing 2-Factor Authentification

5/09/18

There is a scary new exploit out in the wild. KnowBe4's Chief Hacking Officer Kevin Mitnick reveals some startling news. A white hat hacker friend created a tool to bypass 2-factor authentication, and it can be weaponized for any site! This is officially scary. There is a video demo,...

Read More
social engineering test assessment

Is Your Business at Risk? Consider a Social Engineering Test Assessment

5/08/18

While news of the latest cyber-attack are headlines in the security world, it has been revealed that the biggest threats to a company’s security lies much closer to home with their employees. While employees don’t necessarily have to be malicious to put the company at risk, they may not...

Read More
Encrypted Attacks

Encrypted Attacks

5/04/18

Remember Luke Skywalker in the first Star Wars(technically Episode IV), when Obi Wan Kenobi puts a face shield on Luke and asks him to use the force to practice his light saber skills against a zapping hovering ball? While Luke fumbles at first, his innate Jedi skill eventually senses the zapper....

Read More
Microsoft Cloud

The Microsoft Cloud Gives Insight into Every Swing

5/03/18

Microsoft Cloud technology is changing sports. Analyzing a golfers swing is just one example of the transformative power of data. The cloud is revolutionizing the way organizations everywhere are doing business. EnhancedTECH wants you to stay at the front of the pack by transforming your...

Read More