8 tips to tighten up your work from home network

Cyber Security

Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that article is, of course, exactly the same as the headline: if you connect it, protect it. Every time you hook up a poorly-protected device to your network, you run the risk that cybercriminals will find […]

Every Business is a Technology Business

technology background

The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING Bank state, “IT has become the beating heart of the bank?” An executive leader, Heather Mickman, at Target said, “we are a technology company.” Wait, I am confused […]

Phishing tricks – the Top Ten Treacheries of 2020

Screenshot

Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your own staff so that if they do slip up, and click through… …it’s not the crooks on the other end. The phishing scammers are testing you all the time, so you might as […]

Russian cybercrime suspect arrested in $1M ransomware conspiracy

russian background

by Paul Ducklin Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions immediately come up: How much money did the crooks demand? Did the victim pay up? The answers vary, but as you have probably read here on […]

Top Benefits of Microsoft Outlook

message bakcground

What is Microsoft Outlook? Microsoft Outlook is an information and email manager, available as part of the Microsoft 365 suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. If you already subscribe to other Microsoft applications, Outlook is included. You may […]

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.

Business Estrategy

Younghoo Lee is a Senior Data Scientist at Sophos. Together with Joshua Saxe, Sophos Chief Scientist, he recently presented these findings at DEFCON 28 AI Village. Business Email Compromise (BEC) It is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they absolutely shouldn’t, like wire money. […]

The Benefits of Microsoft OneDrive Cloud Storage

Microsoft cloud storage benefits

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is OneDrive? When files are stored in the cloud, the internet is being used to save files to someone else’s servers in a remote location in data centers under the control of that service provider. OneDrive is a Microsoft product available either for […]

How to Avoid and Prevent Email Phishing in Outlook

Password

Here’s an email phishing scam that our own security team received themselves. Apart from some slightly clumsy wording (but when was the last time you received an email about a technical matter that was plainly written in perfect English?) and a tiny error of grammar, we thought it was surprisingly believable and worth writing up […]

Cybersecurity Awareness and Tips

Cyber security

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen Cybercriminals Target the Weakest Link Cybercriminals are relentless. The more business protects themselves the more cybercriminals prey on that which the business cannot directly control – the behaviors of people! Business must invest in ongoing cybersecurity awareness and end-user training to ensure even this […]

ProLock Ransomware Threat

lock background

ProLock ransomware – new report reveals the evolution of a threat Copyright AKAVEIL Technologies LLC all rights reserved Written by Paul Ducklin Let’s start at the very top of the ransomware dilemma. Should you ever pay blackmail money to ransomware crooks? As you can imagine, law enforcement and government bodies around the world regularly say, […]