What Are The Newest Phishing Attacks?

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Phishing is a term adapted from the word “fishing.” When we go fishing, we put a line in the water with bait on it, and we sit back and wait for the fish to come along and take the bait. Maybe the fish was hungry. Perhaps it just wasn’t paying attention. At any rate, eventually a fish will bite, and you’ll have something delicious for dinner.

How Does Phishing Work?
This is essentially how cyber phishing works. Cybercriminals create an interesting email, maybe saying that you’ve won a $100 gift certificate from Amazon. Sound too good to be true? Find out! All you have to do is click the link and take a short survey.

Once you click the link, a virus is downloaded onto your system. Sometimes it’s malware, and sometimes it’s ransomware. Malware includes Trojans, worms, spyware, and adware. These malicious programs each have different goals, but all are destructive and aimed at harming your computers. [Continue reading]

CFO Tech Blog: How To Become The Tech Savvy CFO

More than ever, today’s CFOs are expected to have a degree of tech savviness. Big data and analytics are tools that are just too powerful to ignore in the CFO suite. If you’re not particularly tech savvy, harnessing the power of these tools to the … [Continue reading]

Signs Your PC Needs A Tune-Up (Or Replaced!)

One of the most frustrating things a person can experience in the office is a slow computer system. As modern systems get quicker and Internet speeds continue to soar, we really notice when performance seems off. Watching a video online 10 … [Continue reading]

Using Wireless Printers? Here’s How to Secure Them

With some reports estimating over seven million incidents of cybercrime and online fraud occurring in 2018, it would be a mistake to discount the risks associated with using a wireless printer. After all, any time data is transmitted wirelessly, … [Continue reading]

Your Guide To Microsoft’s End Of Windows 7 Support

Support for Windows 7 is coming to end this year. The operating system is 10 years old, and in the near future, Microsoft will discontinue all support - including security updates - for this version of Microsoft Windows. This means the end of … [Continue reading]

How To Reduce Pop-Ups And Other Browser Best Practices

One of the most annoying things about browsing the web are pop-ups. Depending on your browser, your ability to limit or block pop-ups is probably built-in. If it’s not, there is definitely an extension for that purpose. There are also other ways to … [Continue reading]

New Whaling Schemes: CEO Fraud Continues To Grow

In previous years, the first clue that your corporate email has been compromised would be a poorly-spelled and grammatically incorrect email message asking you to send thousands of dollars overseas. While annoying, it was pretty easy to train staff … [Continue reading]

Five Ways to Deal With Aging Computer Equipment

While upgrading your tech equipment marks an exciting time in the office, it also presents a problem. With the introduction of new technology, you must decide what to do with your old equipment. Provided those items are still in good working order, … [Continue reading]

Inside The Anatomy Of The Human Firewall

Each year, around 61% of small businesses become the victims of a malware attack. While many small businesses may think no one would ever come after them because of their size, know that over half of the total global attacks hit small … [Continue reading]

How Google Password Checkup Can Protect Your Data

While the terminology between a data breach and data leak may not seem very important, being prepared to react to compromised data is. Let’s start with knowing the difference between a breach and a leak. A data breach is an unauthorized intrusion … [Continue reading]