Office: 678-401-2465 itresource@sca-atl.com

OUR BLOG

Be Careful with Online Job Offers

Be Careful with Online Job Offers

Imagine you’re casually scrolling through your LinkedIn news feed when you come across an ad for a position that you’re perfect for, at a company you’d love to be a part of. Considering you are on a website that knows your job title, industry sector, location, etc.,...

Social Engineering Red Flags: Sender

Social Engineering Red Flags: Sender

The prevalence of phishing scams is at an all-time high. Because you are the key to preventing a cyberattack within your organization, it is important to question the legitimacy of every email you receive. Below is a list of questions to ask yourself about who or...

Avoid the Netflix Scam

Avoid the Netflix Scam

The bad guys are sending out emails, disguised as Netflix, that request you to update your billing information. Do not click the link! It will take you to a fake Netflix login page. Once you enter your login credentials, they will have you enter your updated credit...

What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

The bad news is that the hackers are getting more sophisticated in the techniques they're using to release a cyber attack on your company. This can cause serious expense and loss for your company. The good news is that blocking these attacks does not have to be...

Best Practices To Avoid A Cyber Attack Via Social Media

Best Practices To Avoid A Cyber Attack Via Social Media

The bad guys are targeting social media platforms more than ever to perform Cyber Attacks. These sites include Facebook, Instagram, Snapchat, Twitter, Pinterest and many others. They are using many forms of social engineering techniques to effect your company's...

What Is A Phishing Email?

What Is A Phishing Email?

Cyber crime is growing at a rapid pace and it is important for you to know the techniques that the bad guys are using so that you can stay safe. One of the most common is Phishing. Phishing targets you via email, SMS texts or by phone. Phishing is most commonly...

Beware The Pay Stub Scheme

Beware The Pay Stub Scheme

There has been a new threat trending in the cyber security landscape called the Pay Stub Scheme. The bad guys are impersonating your co-workers and requesting that you send them your pay stub. The information they get from the pay stub can back easily lead to identity...

Security Awareness Training

Security Awareness Training

Making sure your employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering and can apply this knowledge in their day-to-day job has become an essential piece of an overall network security strategy. Even with...

What Is Software Patching And Why Do I Need To Do It?

What Is Software Patching And Why Do I Need To Do It?

You may hear techies talking about “system patches” or “Windows updates”. Here’s what that means, and why it's important: On a regular basis, Microsoft releases updates to its Windows operating systems that are currently running on millions of computers and servers...

What Is HIPAA Compliance?

What Is HIPAA Compliance?

Understanding security and compliance is essential for health care providers and health care IT professionals alike. Security and compliance go hand-in-hand to keep sensitive health care data safe. Health care is currently one of the fastest growing sectors of the US...

What Is A Firewall And Why Do I Need One?

What Is A Firewall And Why Do I Need One?

A firewall is a system that is designed to prevent unauthorized access to or from a computer network. It is universally acknowledged as a foundational technology component of a network security strategy. Ideally all communication between your computer and internet...