Articles AKAVEIL

AKA-BLOG

Here you will find articles of interest for your success with IT services and technologies. Learn about current and leading techniques, methods and technologies.

Image

Ransomware Attacks in Healthcare: Security Tips to Secure Your Organization’s Data

The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include, but aren’t limited to: Decentralized busines...

Image

Secure Your Accounts Using App-Based Authentications

In my blog Your Pa$$word doesn’t matter (https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984), I laid out the key pass...

Image

Phishing tricks – the Top Ten Treacheries of 2020

Sophos Phish Threat, in its own words, is a phishing attack simulator (https://www.sophos.com/en-us/products/phish-threat.aspx) – it lets your IT department send realistic-looki...

Image

Russian cybercrime suspect arrested in $1M ransomware conspiracy

Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions...

Image

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely...

Image

Cybersecurity Awareness and Tips

Cybercriminals Target the Weakest Link Cybercriminals are relentless. The more business protects themselves the more cybercriminals prey on that which the business cannot direct...