Cloud Services

AKA-BLOG

Here you will find articles of interest for your success with IT services and technologies. Learn about current and leading techniques, methods and technologies.

Image

Secure Your Accounts Using App-Based Authentications

In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to a gazillion “but other creds can be compromised, too” DMs and emails, I ...

Image

Russian cybercrime suspect arrested in $1M ransomware conspiracy

Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions...

Image

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely...