Bob Deasy

Zero trust is what?

Seems that Zero Trust is NOT a new phenomenon when it comes to information technology. Today it is hard not to hear or see any number of vendors talking about it with great excitement. What is Zero trust? Where did this idea come from? Is there any basis for this concept? 

BYOC is not risk free

Introduction Cyber threats are pervasive and everywhere today it seems. Cyber thieves are having success with snatching passwords via phones, personal email accounts, pirated software, and illegal websites.  We know they are being successful because more and more attacks are yielding positive results like ransom payments and business interruptions. Today, let’s examine the underpinning of …

BYOC is not risk free Read More »

QR code scams: How they work and how to safeguard against them

QR codes are increasingly being used by cybercriminals in QR code scams and attacks. “Invented in the 1990s, QR codes surged during the pandemic. They offered a way for people to access information and conduct activities in a touchless way. Insider Intelligence reports US smartphone users scanning a QR code will increase from 83.4 million …

QR code scams: How they work and how to safeguard against them Read More »

Cybercrime Marketing: Why your Business is their Focus

Cybercrime has grown to become the world’s third-largest economy after the US and China, according to the World Economic Forum (WEF). Based on data from Cybersecurity Ventures, it is projected to cost the world $8 trillion in 2023 and $10.5 trillion by 2025. So, it’s not surprising that Cybercrime Marketing has evolved as rampantly as …

Cybercrime Marketing: Why your Business is their Focus Read More »

Phishing Market Growth Shows No Signs of Slowing

Let’s start with a small trip down memory lane.  Back in 2018, only half of all phishing sites spent money to purchase a security certificate so their site displayed a padlock, an icon used in the web browser’s search bar to determine a website’s legitimacy, according to Krebs on Security. That was nearly 5 years …

Phishing Market Growth Shows No Signs of Slowing Read More »

The Top 7 Reasons Why You’ll Want To Outsource Your IT Support To Us:

1. We Respond Within 13 Minutes Or Less. The average amount of time it takes for one of our clients to get on the phone with a technician who can start working on resolving your problem is 13 minutes. We know you’re busy and have made a sincere commitment to making sure your computer problems …

The Top 7 Reasons Why You’ll Want To Outsource Your IT Support To Us: Read More »

Scroll to Top