blog

We’ve Covered Phishing…. but what is Vishing?

By Jennifer Adams

According to the Norton Security website, 75% of fraud complaints reported to the Federal Trade Commission involve scammers contacting their victims by telephone to steal financial, Medicare or tax information. This can happen to individuals and businesses. Once this information is stolen, the hacker can easily impersonate you. This is what you need to know about vishing so you can make sure it doesn’t happen to you.

What is Vishing?

Tags

The Most Overlooked Security Threat

By Jennifer Adams

When thinking of ways hackers can infiltrate your system, what first comes to mind? Phishing emails and suspicious looking pop-ups are commonly known ways to infect your devices with malware. A frequently overlooked cybersecurity vulnerability is your removeable media. CD’s, DVD’s, flash drives… Just think, how important is the information stored there? These are the risks associated with removeable media and how to manage them.

Data Security-

Human error is responsible for 95% of cyber security breaches. Removeable media can be weaponized in a variety of ways, ranging from being misplaced, destroyed, stolen, or manipulated to destroy your computer.

Tags

They’re Not All Harmless – How Computer Worms Work

By Jennifer Adams

When worms are mentioned, most people typically think of bait used for fishing or gummy worms. While these worms are harmless, computer worms aren’t. Once they are in your computer, they quickly infiltrate your files and spread by sending compromised emails containing identical worms to each of your contacts. This is how computer worms work and how they compromise your security.

What are Computer Worms? 

Tags

Understanding threats – The difference Between Malware and Viruses

By Jennifer Adams

“Malware” and “virus” are catch-all terms used to refer to cybersecurity threats that are often used interchangeably, but what is the difference? What impact do they have on your network? Understanding the difference between a virus and malware is helpful if you encounter a situation that you must address.  Keep reading to find out more.

Malware:

Tags

If it’s too good to be true, it is. How to spot Trojan Horses

By: Jennifer Adams

Just like the Greeks were able to gain access and take the city of Troy by hiding soldiers in a giant wooden horse gifted to them so they could gain access and attack, hackers use trojan horses to trick you into inviting them into your network. Here are a few different kinds of trojans, how to spot them so they do not infect your network, and what to do if you believe one is on your computer.

What is a Trojan Horse?

Tags

Everything You Need to Know About the Most Dangerous Security Threat

By Jennifer Adams

Viruses are detrimental to the well-being of your computer just as they are to human health. One of the most malicious forms of malware is known as a rootkit.  These types of attacks are particularly challenging because they are almost impossible to detect and can go years undetected.  These complex viruses range from programs that steal passwords granting hackers access to banking and credit card information, to software that allows them to disable security software and track the taps of your keys. This is how rootkits infect your computer, a few types of rootkits hackers use, and how to tell if your computer has been infected by one.

Tags

Are they Phishing for your information? Here’s how to tell

By: Jennifer Adams

There are many kinds of attacks hackers can use to infiltrate your system, but one of the most deceptive tactics is phishing. Because the message hackers send appears to be from someone the victim knows, they can acquire personal details to steal their identity before the victim realizes they have been duped. Unfortunately, so many people fall victim to phishing each year that it results in $57 million stolen annually, which is why knowing how to recognize and react to it can spare you loss. Here’s how to identify, respond and report phishing should you become the target.

What is Phishing and how do I spot it?

Tags

Why Your Data Is Less Secure on Paper Than in the Cloud

By Jennifer Adams

According to the Two Sides website, 78% of people keep paper copies of important documents on file because they believe this is more secure than storing information digitally; and 76% are increasingly concerned that information stored electronically is vulnerable to being compromised. Are printed documents more secure than digital?  Security concerns arise at the thought of online bill pay, yet many people never think twice about leaving mail containing personal information in the mailbox for several days. While it can be useful to have a hard copy on hand, there are vulnerabilities associated with having sensitive information on paper, when not stored properly. Here are three reasons why storing your documents digitally is a good idea.

Tags
Subscribe to blog

Subscribe To Updates

Get notified of important Xerox news and helpful articles from XETX.