News

Scammers Are Using These 10 Popular Brands To Trick You Into Revealing Your Private Data

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

 

Cybercriminals know the easiest way to sneak under your radar is to pretend to be a brand you know and trust. These large companies have spent years on marketing, customer service, branding and consistency to build a trustworthy reputation, and hackers leverage this to go after you.

5 Tips To Stop Candidates With The Wrong Stuff

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

I recently had the opportunity to sit down with Carter Cast, the author behind The Right— and Wrong—Stuff: How Brilliant Careers Are Made and Unmade.

18 Laws Of Success From Shark Tank’s Robert Herjavec

This article originally appeared in Direct iT's new magazine, New England Cyber Defender, which you can read for free here.

Serial entrepreneur, investor, television personality, and Ferrari race car celebrity Robert Herjavec has lived the classic rags to riches story.

The Future of IT Support: Embracing Automation, AI, and Cybersecurity

In an era where technology is constantly evolving, small businesses often struggle to keep up with the demands of their IT systems. Whether it’s knowing when and if it’s OK to implement AI and machine learning, embracing the power of the cloud, or keeping up with the latest cybersecurity threats, it can be overwhelming to stay abreast of all the technological changes of the world.

Threat Actor Hacks Former Employer

In a recent case highlighted by the U.S. Department of Justice, a former telecommunications company employee pleaded guilty to passport and wire fraud related to hacking his former employer and co-workers. This incident underscores the significant role of social engineering and employee vulnerabilities in cyber threats, emphasizing the urgent need for companies to establish strong policies to prevent such breaches.

GE “Development and Software Pipelines” allegedly up for sale on Dark Web

In November, a user going by the name "IntelBroker" posted online offering access to "development and software pipelines" from General Electric for $500. After a short period, they increased the stakes by including network access in the offer, posting that "I previously listed the access to General Electrics, however, no serious buyers have actually responded to me or followed up.

Federal Agency on Cybersecurity Insurance Re-Launched

The recently announced Cybersecurity Insurance and Data Analysis Working Group (CIDAWG) represents a renewed initiative aimed at providing robust support to small businesses, which are often more susceptible to cyber threats. Announced last month by Nitin Natarajan, Deputy Director of the Cybersecurity and Infrastructure Security Agency (CISA), this renewed effort serves as an enhanced iteration of its 2014 predecessor.

Embracing Zero Trust Networks: A New Era of IT Security

Are you a small business owner tired of battling constant cybersecurity threats and worrying about your network's vulnerability? In today's digital landscape, where data breaches and cyberattacks are becoming more sophisticated, traditional security measures may no longer be enough to protect your valuable assets.