Coming Soon: AI-Powered Assistants Bringing Seamless Document Retrieval

Imagine yourself seated at your desk, facing the frustrating challenge of locating a document buried deep within the archives, dating back to a considerable time ago. The document seems to have mysteriously vanished from its designated folder, and your quest involves an extensive and time-consuming search, with no guarantee of success.

Scammers Are Using These 10 Popular Brands To Trick You Into Revealing Your Private Data

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

 

Cybercriminals know the easiest way to sneak under your radar is to pretend to be a brand you know and trust. These large companies have spent years on marketing, customer service, branding and consistency to build a trustworthy reputation, and hackers leverage this to go after you.

5 Tips To Stop Candidates With The Wrong Stuff

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

I recently had the opportunity to sit down with Carter Cast, the author behind The Right— and Wrong—Stuff: How Brilliant Careers Are Made and Unmade.

18 Laws Of Success From Shark Tank’s Robert Herjavec

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

Serial entrepreneur, investor, television personality, and Ferrari race car celebrity Robert Herjavec has lived the classic rags to riches story.

The Future of IT Support: Embracing Automation, AI, and Cybersecurity

In an era where technology is constantly evolving, small businesses often struggle to keep up with the demands of their IT systems. Whether it’s knowing when and if it’s OK to implement AI and machine learning, embracing the power of the cloud, or keeping up with the latest cybersecurity threats, it can be overwhelming to stay abreast of all the technological changes of the world.

Threat Actor Hacks Former Employer

In a recent case highlighted by the U.S. Department of Justice, a former telecommunications company employee pleaded guilty to passport and wire fraud related to hacking his former employer and co-workers. This incident underscores the significant role of social engineering and employee vulnerabilities in cyber threats, emphasizing the urgent need for companies to establish strong policies to prevent such breaches.

GE “Development and Software Pipelines” allegedly up for sale on Dark Web

In November, a user going by the name "IntelBroker" posted online offering access to "development and software pipelines" from General Electric for $500. After a short period, they increased the stakes by including network access in the offer, posting that "I previously listed the access to General Electrics, however, no serious buyers have actually responded to me or followed up.