Microsoft 365 comes with several built-in security features that allow your organization to manage how sensitive information is handled via email. On this episode of Cup of IT, we’ll be discussing how to send secure emails using sensitivity labels, email encryption, and the do-not-forward options in Microsoft 365.
Today’s cybersecurity landscape is filled with a variety of evolving threats, demanding new ways to protect your data. On this week’s One-Minute Wednesday, we’ll cover how Two-Factor Authentication can keep you safe from the vast majority of cybersecurity breaches.
Public charging stations are a convenient way to ensure your mobile devices stay charged when you’re on the go. But should you always trust them? On this week’s One-Minute Wednesday, we’ll be taking a look at some of the hidden dangers you might find in public charging stations and how you can keep yourself safe.
Cybercriminals commonly disguise themselves as tech support analysts and attempt to trick people into giving credit card info or access to sensitive data. On this week’s One-Minute Wednesday, Jason Carter will give you a breakdown of what a Tech Support Scam looks like and how to keep your devices and data guarded from attacks.
With tax season coming up, cybercriminals are planning out ways to steal money and sensitive information through a variety of phishing scams. On today’s One-Minute Wednesday, Derek Duhaime will illustrate what some of those scams look like and what you can do to remain safe while filing your taxes.
Google searches can be a normal part of anyone’s day. Typically you get the results you need, but sometimes malicious ads, or Malvertising, can find their way in your search results. On today’s One-Minute Wednesday, Rachel Telander will provide some steps to stay on guard when encountering ads in your search results.
During the holiday season, cybercriminals will be ready with a variety of scams to take advantage of online shoppers. On today’s One-Minute Wednesday, Lindsey Brenes will discuss some of the recent methods hackers like to use and how you can shop safely online.
Cybercriminals are always innovating new ways to steal your data, so it’s imperative to stay vigilant as you spend time online and in your email. On today’s One-Minute Wednesday, John McCormack will discuss a new threat called Homographic Domains, which are fake web addresses that use special characters to make themselves look exactly like the real domain they are copying.
A new cyberattack called “PhishPoint” is currently threatening Office 365 users. PhishPoint bypasses Microsoft’s security by hiding malware inside of SharePoint documents that steal your Microsoft credentials. On today’s episode of One-Minute Wednesday, Ross Heuer will cover how this attack operates and the steps to keep yourself from becoming a victim of this scam.
BlueBorne is a new cyber-threat that is attacking Bluetooth-enabled devices. Hackers are using Bluetooth connections to infiltrate and steal information from phones, laptops, and more. On today’s episode of One-Minute Wednesday, Nathanael Emenaker will go over the basics of how this malware works and the steps you can take to keep yourself secure.
Cybercriminals continue to innovate sophisticated new attack vectors, but email phishing is still the most common and effective tactic for criminals looking to steal money or sensitive data. On today’s One-Minute Wednesday, Drew Lawson will discuss a common phishing tactic called business email compromise (or BEC) and review some ways to identify and protect yourself from this type of attack.
On this week’s One Minute Wednesday, Melanie Nunn will be giving an overview of social engineering tactics. Cybercriminals commonly use social engineering schemes to manipulate their targets into giving up sensitive information. And since these attacks can come from a variety of angles, it’s important for you to identify the features of a social engineering attack so you can protect yourself.
Protect your data while browsing the internet in public! On this week’s One-Minute Wednesday, Drew Lawson will be discussing some of the risks associated with public wi-fi networks, and how to avoid falling victim to “man-in-the-middle” attacks. Don’t miss out on these valuable tips for keeping your data secure.
Our mobile devices are a part of today’s everyday life. We perform a multitude of daily tasks on them that reach far beyond just making phone calls. But mobile technology, such as smartphones, can be just as vulnerable as any computer to cyber attacks. So in this week’s One Minute Wednesday, Joon Koh will give you some advice on how to keep both you and your data secure when doing different functions on your device.
Google Chrome extensions are great tools for boosting your productivity and giving you a better browser experience. However, some extensions can be infected with hidden malware. On today’s One-Minute Wednesday, Issac McIntosh will give a few examples of malicious extensions along with some precautionary steps you can take to stay protected.
Social engineering scams come in many forms. Have you thought about what to do when a hacker shows up at your front door? On this episode of One-Minute Wednesday, John McCormack will go over some steps to protect yourself from an attack called “tailgating”, where hackers disguise themselves as legitimate vendors and try to infiltrate your office.