You’ve probably heard the term “cache” and “cookies” thrown around in relation to internet browsing. Did you know that this data is also stored on your mobile devices? Here we will discuss what they are, why you should clear them and how to do it. CACHE & COOKIES – WHAT ARE THEY? Cookies small snippets of data stored on your …
Have you been hacked? Now what?
Phishing, there I said it. You’ve heard it a million times–and with COVID19, probably a million & 1. But here’s the thing. It’s VERY real, it can happen to ANYONE and you need to be vigilant about it. Try this tool to see if an email address has been compromised and if so, it’s time to consider a password manager. …
Cybersecurity Webinar
Farr Shepherd, President of Decypher Technologies, recently co-hosted a cybersecurity webinar in partnership with Roaring Fork Leadership. If you missed the window to register for the live Zoom event, you’re in luck. Check it out here!
Digital Safety Tips
By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …
Cyber-Safety & Working From Home
Cyber-criminals are beginning to use Coronavirus and COVID 19 as subject lines in phishing scam emails. Use extra caution with emails from an unknown source. Here are some helpful tips to keep yourself out of cyber-harm’s way. Use work devices only for work. Use a personal device for personal use such as checking in on Instagram, online banking, school work, etc. …
Remain Vigilant!
By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true” or suspicious email offers. Especially links contained within those emails. Read these digital protection …
The 2020 State of Cybersecurity Networking Event
Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …
13 Ransomware Statistics All Businesses MUST Know
Notice: JavaScript is required for this content.
An Added Benefit For Our Managed Prevent Clients
An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains with characters that are so similar to the real thing that they can trick people into thinking the links are legitimate. Luckily, our email spam solution, Proofpoint, quarantines email from unicode domains …
Managed Services Team – Behind the Scenes
MANAGED SERVICES TEAM – BEHIND THE SCENES Our Managed Services offer a wealth of great benefits. Here’s a brief snapshot of what our technicians are up to on a daily basis to keep our Managed Service Clients’ technology running smoothly, safely and consistently: We monitor servers for functionality to prevent unexpected issues like a drive filling up causing bottlenecks in …
Browsing History, Key Commands and Passwords
BROWSING HISTORY, KEY COMMANDS AND PASSWORDS We want to keep you informed with the latest technology tips. Here are some that we’ve found most helpful this month. In Chrome or Firefox browsers, you can quickly find a recent page you visited by right-clicking on the back arrow to view a list of your browsing history. Or, in the event that …
Take Google’s Phishing Quiz to Sharpen Your Security Skills
Take Google’s Phishing Quiz to Sharpen Your Security Skills This month, we’re sharing a great tool you can use to help train your staff to resist email phishing attacks. Google has a phishing quiz that everyone should take, and it’s a lot harder to pass than you might think! The quiz teaches you how to spot indicators of a phishing …
Cybersecurity & Russia, iPhone Charging, and more…
Cybersecurity & Russia, iPhone Charging, and more… Keyboard on Windows If you tend to accidentally press keys on your keyboard (perhaps due to hand tremors), “Filter Keys” can be enabled on Windows to slow down the key response so mistyped or repeated keystrokes don’t register. This accessibility feature doesn’t seem to affect regular typing. Outlook Calendars You can merge calendar …
Memorable Passwords, Phishing, and Troubleshooting
Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …
DocuSign Scam, Outlook and a Software Recommendation
DocuSign Scam, Outlook and a Software Recommendation Scam Alert A DocuSign Scam has circulated that makes the email from “DocuSign” look very legitimate. If you receive an email from DocuSign from an unknown party, please be aware. This is a phishing request whereby the scammer is looking for you to click on a link and provide them with your personal …
Email Encryption, Send Limits, and Equipment Replacement
Email Encryption, Send Limits, and Equipment Replacement Equipment Replacement Often, sticker shock steers us to purchase cheaper solutions, but these decisions can come at a cost. That cost could be increased down time or more frequent service calls due to equipment failures. Replacement equipment should be of the same or higher quality than the item replaced. For example, Decypher would …
Important Security Update – Petya Cyberattack
What is Petya? This ransomware is a variant of an older attack, dubbed “Petya,” except this time the attack uses EternalBlue to target Windows systems—the same exploit behind the infamous WannaCry attack. While this variant appears to be an upgraded version of Petya, there is no confirmation that this attack is from the same author. It differs from typical ransomware …
Cybersecurity Tips To Avoid Getting Hacked
No one wants to get hacked, but the reality of our online environment means it will likely happen sooner or later if we don’t follow the latest cybersecurity tips. This month’s Tech Tips focuses on keeping your information safe to stay ahead of hackers. Keep reading for important tips that will help you stay secure. Strengthen Your Passwords Many of …