Email Scam

New Terror Email Scam


There’s a new email scam sweeping across the nation using fear to motivate it’s victims into paying a ransom. The scam threatens to detonate a concealed bomb in the user’s place of business. This email is a hoax. Not surprisingly, it originated from Russia, the Russian Federation to...

Read More
Offensive Security Engagements

Why SMB’s Need to Utilize Offensive Security Engagements


My name is Dave Collins and I am a security analyst here at ETGI / DarkHound Security. I’ve previously written about threat actors targeting the small to mid-size business (SMB) space here and now I want to expand on the concepts I covered in that article. Today I want to focus on offensive...

Read More
Tips to Avoid Ransomware

Tips to Avoid Ransomware


Combatting ransomware is always on the forefront of cyber news. This week an article by Joe Merces, the former CIO of the New York City Law Department (the world's largest public sector law firm) and now CEO for Cloud Daddy was published on the best practices for avoiding ransomware. Merces...

Read More

How to Securely Manage Your IoT Devices


Managing IoT devices is a lot like running a preschool after recess. The toys are all over the place and the kids are going crazy. So how do IT security professionals protect their business from cyber risk and still let the employees have access to all their connected devices? A good place to...

Read More
Cyber Security Best Practices

The Majority of Users Don’t Know Cyber Security Best Practices


Cyber Security Best Practices: According to KnowBe4 and new data from MediaPRO’s third annual State of Privacy and Security Awareness Report, users are less prepared this year to address the risk of cyberthreat. With the threat of cyber attacks increasing, organizations would like to think...

Read More
Information Pivacy

California Passes New Information Privacy Law


California is stepping up it's game in cybersecurity to protect your identity. The CA legislature recently passed the "Information Privacy: Connected Devices" bill that will come into effect on January 1, 2020. The bill will require a manufacturer of a connected device to equip the device with...

Read More
Online Reputation

Protecting Your Online Reputation


In the days of old, maintaining a good reputation boiled down to good service. Do a job well and people will refer their friends and colleagues. Today, not so much.  Social media and the internet have added an extra layer of complexity. Does your brand hold weight in the digital world? Do your...

Read More
Credential Scams Growing

Credential Scams Growing


Love them or hate them but passwords are a twentieth-century solution to a twenty-first century problem. And Hackers are exploiting our human tendency to pick the easiest passwords that we can remember. Kids, dogs, birthdays...sound familiar? The Apple Credential Scam continues to roll...

Read More
Facebook Breach

Do you Facebook?


With 800 million users worldwide, Facebook has been breached again. On September 16, 2018, Facebook noticed unusual spike of users accessing the social media giant and started an internal investigation. On September 25, 2018, the Facebook engineering team had discovered that hackers had...

Read More

Why Paying Ransomware Makes You a Repeat Customer


SMB's often assume they're not a likely target of cybercrime. As I've suggested before, this couldn't be further than the truth. Cyber attacks on smaller organizations can be devastating, and recent surveys suggest just how common they can be. According to Hiscox Insurance, at least half of the...

Read More