MAC HOLIDAY GLOW-UP: DESKTOP EDITION!
Who says your Mac can’t get into the holiday spirit? We’ve got THE ULTIMATE guide to turn your boring desktop into a festive wonderland! LIGHT IT UP! Festivitas app, string lights everywhere, ugly Christmas sweater vibes, Christmas tree on your screen? Tag a Mac friend who needs this FESTIVE TECH GLOW-UP! #MacHoliday #TechDecor #FestiveMac
[Heads Up] QR Code Phishing is Growing More Sophisticated
Sophos describes a QR code phishing (quishing) campaign that targeted its own employees in an attempt to steal information. The attackers sent phishing emails that appeared to be related to employee benefits and retirement plans. The emails contained PDF attachments which, when opened, displayed a QR code. If an employee scanned the code, they would be taken to a phishing page that spoofed a Microsoft 365 login form. The page was designed to steal login credentials and multi-factor authentication codes. One of Sophos’s employees fell for the attack, showing that even cybersecurity companies are vulnerable to social engineering. Phishing links…
Security Hints + Tips
How to Stay Safe While Working from Home You may work remotely on a regular basis or you may have been mandated to work remotely due to unexpected circumstances. Either way, working from home can feel much different from working in an office. You could find yourself snacking more often, getting distracted by furry friends, or forgetting the last time you put on real pants. No matter how your environment changes, it is important to keep one thing the same: your organization’s security. Keep your data safe by creating a secure workspace, maintaining digital security, and by following the same…
Security Hints + Tips — Pretexting
Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as employees of bank or credit card companies to manipulate you into divulging personal or sensitive information. How it Works: Common Tactics of InfluenceThe bad guys will try to persuade you into giving them sensitive information. Oftentimes, the information that they need is not specific to your organization. Below are examples of two common tactics used to influence victims in pretexting scenarios: Pretexting with AuthorityYou receive a call at work from someone demanding immediate assistance. They…
Security Hints + Tips
Don’t Be Fooled by Workspace Tools Many organizations use platforms such as Microsoft Teams, Google Drive, or Zoom to stay connected. Unfortunately, these trusted communication tools can lead to a false sense of security. Just like with traditional email, bad guys can use these platforms to launch a cyber attack. Below are three examples of how cybercriminals use these platforms for phishing—and what you can do to keep your organization safe Lurking Recently, a cybercriminal gained access to an organization’s Microsoft Teams channel, which is similar to a group message or a chat room. The scammer lurked in the channel…
Chris Freeman
Since December 1998, Chris has been an integral part of the WVNET Telecommunications Department. Initially stepping in as the primary field technician, Chris has journeyed to every county courthouse and college campus that WVNET has ever supported. His hands-on experience is vast: from installing modem chassis, routers, and switches to maintaining an array of communication equipment.