ThreatProtector Blog

Voting for Cybersecurity Education

Voting for Cybersecurity Education

No, this is not a political office. In fact, we know that there are some topics that are not even worth trying. They are important, but different opinions have their value. Yet, cybercrime should make us a united front against it.  It's a choice, and it's making it a...

read more
Holiday Season Fraud Prevention Guide

Holiday Season Fraud Prevention Guide

The holiday season is also the phishing and scams season as attackers leverage the increasing use of online shopping to get credentials or money. This increase will likely be more dramatic this year due to the COVID-19 pandemic. With an increase in people staying safe...

read more
How Phishing Can Impact Your Business

How Phishing Can Impact Your Business

Phishing is one of the most popular forms of attack that cybercriminals utilize. No matter whether you are a one-person entrepreneur or a global corporation, the danger of falling victim to a phishing scam is on the rise, and criminals become increasingly more...

read more
What Is System Endpoint Protection?

What Is System Endpoint Protection?

How secure are your IT solutions? Businesses across the globe utilize various tools to keep their staff connected with each other and their clients. From laptops and desktops to smartphones and tablets, there is a huge array of devices being used, creating multiple...

read more
What is Cryptojacking and How You Can Stop It

What is Cryptojacking and How You Can Stop It

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web...

read more
Insider Threats:  What’s the Harm?

Insider Threats: What’s the Harm?

Some may think this type of activity is a victimless crime. Quite the contrary! Identity Theft: The unauthorized access of information brought about by an employee's abuse of their privileges could result in identity theft issues for those whose information was...

read more
Cybersecurity Awareness Month in October

Cybersecurity Awareness Month in October

Cybersecurity awareness month always is in October of each year. If we can guarantee this year, we must adopt cyber intelligence practices. Uncertainty, unexpected circumstances, and unknown factors allow hackers to gain our trust and ultimately access professional or...

read more
City Takeovers with RobbinHood Ransomware

City Takeovers with RobbinHood Ransomware

RobbinHood – the Not so Heroic New Outlaw Stealing from the rich to give to the poor – in theory, the original Robin Hood had good intentions. There’s a new generation of him and his not so merry men and in this adaption, the takeovers are far less charitable. Using...

read more
Ransomware Attacks up 105% in Q1 of 2019

Ransomware Attacks up 105% in Q1 of 2019

Ransomware Is Not Randomware Gone are the days where you “might know” someone who has, or will, come under attack to a ransomware attack. The skyrocket in cases has come in at a 105% increase according to Beazley Breach Response (BBR) Services team which compared...

read more
Casting a Wide Net

Casting a Wide Net

In business, if you can cast a bigger net to reach a larger audience, it’s considered a good idea – a win. Unfortunately, hackers are now taking the same approach. With c-level executives offering a higher payoff when compromised, sending out phishing emails to the...

read more
The Future is Here

The Future is Here

Sunday funnies Remember the Jetsons? Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks? Flying cars aside, we aren’t too far off from the technology that seemed so unlikely and impossible. The future – it’s here. We live in...

read more
Think Global, Act Local

Think Global, Act Local

When Global News Hits Home When you hear and watch news headlines, you can often tune out. It’s not happening here; it’s not affecting you directly. It’s a global issue right now. You’ll worry about it when things are closer to home. The problem is, by the time it...

read more
5 Steps to Protect Your Information Online

5 Steps to Protect Your Information Online

Spending time on the internet and social channels is good for us, as it helps us to get connected with our loved ones. But do we really care about our data privacy? How much time do we spend to keep our personal information safe? The good news is that you can continue...

read more