BYOD Security

BYOD Security

Share: Facebook Twitter Google Email

Securing your BYOD policy Work practices have undergone a revolution in the digital age. Networked devices and more mobility have blurred the line between work and home as vast numbers of people perform their jobs across multiple platforms, often far from the office. An accompanying...

Mobile Phishing

Watch out for Mobile Phishing

Share: Facebook Twitter Google Email

Phishing on mobile devices? Yep, it's a thing. According to researchers at Wandera, phishing is the number one mobile threat affecting organizations. New research in Wandera’s Phishing Report 2018 shows that mobile users are 18x more likely to be phished than to download malware, and that 4000...

Encrypted Email

Encrypted Email Security Flaw

Share: Facebook Twitter Google Email

Think your business is safe because your emails are encrypted? Maybe not. A security flaw within email encryption looks like it has left a small opening for hackers to read your private messages. Called Efail by European researchers. the vulnerability doesn't break email encryption standards...

Password Stealing

Password Stealing Malware on FB Messenger

Share: Facebook Twitter Google Email

A variant of malware using fake Facebook Messenger messages to infect other users has re-emerged with new schemes to steal passwords, steal cryptocurrency and participate in cryptojacking. The scam was first discovered in August last year with the malware using phishing messages over Facebook...

2-Factor Authentification

Hackers Bypassing 2-Factor Authentification

Share: Facebook Twitter Google Email

There is a scary new exploit out in the wild. KnowBe4's Chief Hacking Officer Kevin Mitnick reveals some startling news. A white hat hacker friend created a tool to bypass 2-factor authentication, and it can be weaponized for any site! This is officially scary. There is a video demo,...

social engineering test assessment

Is Your Business at Risk? Consider a Social Engineering Test Assessment

Share: Facebook Twitter Google Email

While news of the latest cyber-attack are headlines in the security world, it has been revealed that the biggest threats to a company’s security lies much closer to home with their employees. While employees don’t necessarily have to be malicious to put the company at risk, they may not...

Encrypted Attacks

Encrypted Attacks

Share: Facebook Twitter Google Email

Remember Luke Skywalker in the first Star Wars(technically Episode IV), when Obi Wan Kenobi puts a face shield on Luke and asks him to use the force to practice his light saber skills against a zapping hovering ball? While Luke fumbles at first, his innate Jedi skill eventually senses the zapper....

Microsoft Cloud

The Microsoft Cloud Gives Insight into Every Swing

Share: Facebook Twitter Google Email

Microsoft Cloud technology is changing sports. Analyzing a golfers swing is just one example of the transformative power of data. The cloud is revolutionizing the way organizations everywhere are doing business. EnhancedTECH wants you to stay at the front of the pack by transforming your...

Are Passwords Obsolete?

Share: Facebook Twitter Google Email

New web standards passed this last month could lead to the end of regular "passwords." The new standard, WebAuthn, is close to final approval from the World Wide Web Consortium, which sets Web standards. WebAuthn defines a standard Application Program Interface that can be incorporated into...

Cyber Defense

Reducing Attack Surfaces Key to Cyber Defense

Share: Facebook Twitter Google Email

In strategic warfare, it's a good idea to limit the amount of attack surfaces available, meaning reducing the amount of areas the enemy can gain access to wage war against you.  If your enemy has to go through a moat, a castle wall, archers and boiling water to get to battle you in your Teflon...