by itresource@sca-atl.com | May 23, 2022 | Cyber Security
You’ve probably seen employees wearing security badges at their organization’s offices. Can you think of how many different organizations’ badges you can recognize? Can you recall the details of the badges you’ve seen? There are several...
by itresource@sca-atl.com | May 13, 2022 | Cyber Security
A phishing campaign is using short, terse emails to trick people into visiting a credential-harvesting site, according to Paul Ducklin at Naked Security. The email informs recipients that two incoming messages were returned to the sender, and directs the user to visit...
by itresource@sca-atl.com | Apr 22, 2022 | Cyber Security
Do you keep a login and password written down on a Post-it or piece of paper near your desk? If so, you should get rid of it by following your company’s sensitive document disposal policy. If your company does not have such a policy, you should use a paper...
by itresource@sca-atl.com | Apr 4, 2022 | Cyber Security
You may have seen a suspicious email that appears to come from a trusted source, such as a friend or a popular brand. But have you ever seen a suspicious email that appears to come from you? In a new scam, cybercriminals use your own email address to send phishing...
by itresource@sca-atl.com | Mar 2, 2022 | Cyber Security
The recent war in Ukraine has gathered a lot of attention. Unfortunately, cybercriminals often take advantage of world events to prey on your emotions. Now more than ever, it’s important to watch out for phishing attacks and disinformation campaigns. Cybercriminals...
by itresource@sca-atl.com | Feb 24, 2022 | Cyber Security
QR codes have become increasingly popular in recent years, especially due to social distancing efforts and a need for contactless services. They are commonly used to access restaurant menus, discount codes, and to make payments. Unfortunately, cybercriminals have...