hurricane irma

Weathering the Aftermath of Hurricane Irma

10/05/18
Share: Facebook Twitter Google Email

Every business wants to be there for their customers. But what happens in the aftermath of a natural disaster? Kelly Roofing in Florida normally fields about 150 calls for estimates per week, but the week after Hurricane Irma, it fielded 26,000. Let me say that again...they fielded 26,000...

Credential Scams Growing

Credential Scams Growing

10/03/18
Share: Facebook Twitter Google Email

Love them or hate them but passwords are a twentieth-century solution to a twenty-first century problem. And Hackers are exploiting our human tendency to pick the easiest passwords that we can remember. Kids, dogs, birthdays...sound familiar? The Apple Credential Scam continues to roll...

Facebook Breach

Do you Facebook?

10/02/18
Share: Facebook Twitter Google Email

With 800 million users worldwide, Facebook has been breached again. On September 16, 2018, Facebook noticed unusual spike of users accessing the social media giant and started an internal investigation. On September 25, 2018, the Facebook engineering team had discovered that hackers had...

Accounting Firms

Accounting Firms are Big Target for Hackers

9/28/18
Share: Facebook Twitter Google Email

Over the past few years cyberattacks have left no industry unscathed. Of the 78,617 business and email account compromise scams, 41,058 occurred in the United States. The costs resulted in companies suffering $2.9 billion in losses from October 2013 to May 2018. Globally, cyber-crime is expected to...

Ransomware

Why Paying Ransomware Makes You a Repeat Customer

9/27/18
Share: Facebook Twitter Google Email

SMB's often assume they're not a likely target of cybercrime. As I've suggested before, this couldn't be further than the truth. Cyber attacks on smaller organizations can be devastating, and recent surveys suggest just how common they can be. According to Hiscox Insurance, at least half of the...

payroll diversion

New Cyber Scam To Obtain Employee Credentials To Conduct Payroll Diversion

9/25/18
Share: Facebook Twitter Google Email

HR watch out! Cybercriminals are utilizing social engineering techniques to obtain employee credentials to conduct payroll diversion The FBI issued a public service announcement last week regarding new criminal campaigns that target the online payroll accounts of employees in a variety of...

Robotic Process Engineering

Can Robotic Process Engineering Transform Your Business?

9/20/18
Share: Facebook Twitter Google Email

One of the most talked-about trends in the digital economy is robotics and its ability to perform tasks infinitely faster and more accurately than human workforces. The key to such advances is automation. Specifically, robotic process automation (RPA), which uses software ‘robots’ governed...

moving to the cloud

Why the Smart Money is Moving to the Cloud

9/20/18
Share: Facebook Twitter Google Email

We all love having the latest, newest and best technology but there’s one small problem: whatever you buy today will be obsolete tomorrow. And with technology’s accelerating rate of change, ‘tomorrow’ comes faster and faster every year. That’s why ‘as a service’ (aaS) software (and...

macOS Mojave

Are you ready for macOS Mojave?

9/19/18
Share: Facebook Twitter Google Email

It’s that time of year again when leaves fall from the trees, football reigns supreme, and most importantly, when Apple releases its next version of macOS to the public. But what can you expect from this next OS release? Does it live up to the Apple hype? macOS Mojave, 10.14, will pack a few...

Spoof

How to Spot a Spoofed Email

9/14/18
Share: Facebook Twitter Google Email

Question:  A friend contacted me and said he received a “this might be of interest” email from me and suggested I was hacked. I checked around but none of my other friends in my contacts got it. Is there a way to verify I have been hacked before I go through the pain of changing my primary...