Fixing Your Weakest Link: Your Employees

Even if you have every security hardware/software available, such as a firewall, backup disaster recovery device, and anti-virus, your employees could still be your organization’s most significant vulnerability regarding phishing attacks. How can you minimize the risk as much as possible?  Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. When creating a …

How to Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim they could tell immediately if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing websites every month. A 65% increase in attacks in one year! Hackers would have moved on to their next idea …

What Is Phishing & How Are Hackers Using It?

Although the number of individuals who fall for the infamous Nigerian prince scam has declined, phishing remains a significant concern. In fact, over the past year, hackers worldwide have executed 65% more phishing attacks.  Phishing is a fraudulent activity where hackers create emails, forms, and websites that look like those of legitimate companies to trick people into sharing their sensitive …

man snacking at his PC

Where do cyber-attacks start?

Cyberattacks can happen on any device at any given time, so how do you know which of your devices you need to protect? It helps first to clarify where these attacks come from. In the past, attacks came from outside sources, or, in other words, the internet. Cybersecurity companies combatted these attacks by setting up firewalls, Intrusion Detection System (IDS), …

fading man at a laptop

Understanding different types of Malware

Malicious software — or malware — is talked about when dangerous software is used to access and infect a computer or network without being detected. A lot of people hear terms like viruses, adware, spyware, ransomware, worms, or Trojan horses; these are all different types of malware that can severely damage computers, devices, and networks. Cybersecurity companies like Decypher Technologies …

man disintegrating in front of the PC

Cybersecurity Tips for SMBs

When it comes to cybersecurity, small and medium-sized businesses (SMBs) face unique challenges. They are often targeted by cybercriminals, but have limited resources to invest in robust security measures. There are several simple steps that SMBs can take to improve their cybersecurity posture. Our goal in this blog post is to provide key cybersecurity tips for SMBs. Train your employees …

Combatting Business Email Compromise Risks

An old scam that keeps reinventing itself with new victims. Don’t become one!  You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that …

business email compromise timeline

Business E-Mail Compromise

Business E-Mail Compromise Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries around the world—from non-profits and well-known corporations to churches and school systems. Losses are in the billions of dollars and …

Digital Safety Tips

By now, we’re all a bit coronavirus weary–maybe even a bit anxious to find out how things are progressing as states and businesses begin to re-open. There are endless offerings of websites, apps, news stories, etc. to stay current. Now more than ever, it is critical to exercise caution in your consumption of news. There is a lot of malicious …

Remain Vigilant!

By now we’re all pretty savvy when it comes to recognizing a scam but remain vigilant! The “bad guys” are savvy too, particularly in the midst of this COVID 19 pandemic. Practice extra caution with calls from unrecognized phone numbers and “too good to be true”  or suspicious email offers. Especially links contained within those emails. Read these digital protection …

The 2020 State of Cybersecurity Networking Event

Farr Shepherd invited to speak at The State of Cybersecurity networking event hosted by Digital Resource. West Palm Beach, FL – 1/29/2020 – Farr Shepherd, President, Decypher Technologies presented The State of Cybersecurity 2020 in partnership with Jim King of Atlantic Pacific Insurance. The presentation was hosted by Digital Resource in West Palm Beach, FL. Farr’s speech covered 2 main …

Petya-Security-Alert

An Added Benefit For Our Managed Prevent Clients

An Added Benefit For Our Managed Prevent Clients Decypher has recently made a commitment to improving our processes in blocking unicode domain phishing. Unicode phishing uses emails and domains with characters that are so similar to the real thing that they can trick people into thinking the links are legitimate. Luckily, our email spam solution, Proofpoint, quarantines email from unicode domains …

iphone tips

A Recent iPhone Scam

A RECENT IPHONE SCAM iPhones are notoriously safe against viruses and malicious software. And most of us would consider ourselves wise in detecting these cyber-scams in the current age of technology. However with Social Engineering, a scammer can easily impersonate Apple, for example. When caller ID says that Apple, Inc. is our incoming call, we would likely assume it’s safe, …

windows shortcuts

Memorable Passwords, Phishing, and Troubleshooting

Memorable Passwords, Phishing, and Troubleshooting When Troubleshooting, Don’t Overthink It If your computer is acting erratically, try basic troubleshooting first. This could include powering the machine down, then back up, closing windows and quitting programs. Also, don’t forget about external devices, as sometimes disconnecting these can resolve the issue. Try disconnecting the keyboard, mouse, track pad, etc. to see if …