Was Your Information Compromised From The National Public Data Breach?

Submitted by Amy Rizzo on Thu, 10/31/2024 - 09:00

National Public Data confirmed in September 2024 that a hacker has compromised the personal records of millions of individuals. The information exposed includes the names, e-mail addresses, mailing addresses, phone numbers and even Social Security numbers of up to 2.9 billion people. Here’s what you need to know.

What happened?

National Public Data, a consumer data broker that specializes in providing criminal records, background checks and other forms of data to private investigators, consumer public record sites, human resources, staffing agencies, the government and more, was hacked. The incident is believed to have started in December 2023 when a third-party bad actor attempted to gain access.

5 Signs It’s Time To Update Your Software (And How To Do It Safely)

Submitted by Amy Rizzo on Wed, 10/16/2024 - 08:57

Software updates can feel like a nuisance, but skipping them is one of the easiest ways to leave your systems vulnerable to cyber-attacks. Hackers are constantly looking for weaknesses, and outdated software is like an open door to your network.

But how do you know when it’s time to update, and should you always trust your computer to tell you? Here are five clear signs it’s time to update, plus tips on how to handle updates safely.

1. Your Software Is No Longer Supported

If the software provider has stopped releasing updates for your current version, it’s a major red flag. Unsupported software often has known vulnerabilities that cybercriminals can easily exploit. Check for announcements from your software providers about end-of-life support and upgrade as soon as possible.

Tip: Don’t wait for the software to “break” before updating. Plan ahead and migrate to newer versions while you still have full support.

The S.E.C.U.R.E. Method To Stop Phishing E-mails

Submitted by Amy Rizzo on Wed, 10/09/2024 - 06:20

Phishing attacks are the most common cybercrime attack for one reason…they work. Every day, over 3.4 billion spam e-mails reach unsuspecting users’ inboxes. Phishing e-mails have held the top spot as the most frequent form of attack for years because they’re easy to implement, easy to scale and continue to fool people. AI tools like ChatGPT are now making it even easier for cybercriminals to create e-mails that look and sound like they’re coming from humans instead of bots and scammers. If you’re not careful, the effects of phishing scams can be detrimental.

Since it’s Cybersecurity Awareness Month and phishing e-mails are one of the top causes of attacks, we created this simple guide to help you and your team successfully identify phishing e-mails and understand why it’s so important to do so.

What can happen? Here are 4 significant dangers associated with phishing attacks:

1. Data Breaches

The End Is Almost Here! Windows 10 Will No Longer Be Supported As Of October 2025

Submitted by Amy Rizzo on Tue, 10/01/2024 - 08:34

Important News: Microsoft will NO LONGER support Windows 10 after October 2025! While these PCs will still work after the official end date of October 14, 2025, Microsoft will no longer provide product key free services that keep your device working properly and securely. These services include:

  • Security updates
  • Non-security updates
  • Technical support

Why Is This Important For Business Owners?

Microsoft Copilot Techniques To Boost Business Productivity

Submitted by Amy Rizzo on Tue, 09/24/2024 - 10:22

Even if you’re tired of hearing about AI, the reality is that those who embrace it, find the tools that work and learn how to use them efficiently WILL get ahead of those who refuse to try. However, sorting through the thousands of AI-powered programs on the market can feel like a daunting task, which is why we want to highlight one that we support.

Microsoft Copilot is an advanced AI-driven tool that leverages artificial intelligence to automate routine tasks, analyze data, facilitate collaboration and more. Its chat-like design works seamlessly across commonly used Microsoft applications like Word, Outlook, PowerPoint, Excel and Teams and can significantly boost productivity. Unfortunately, most companies often underutilize it. Today, we’re sharing seven ways you should use Microsoft Copilot to enhance efficiency in your business.

The CrowdStrike Outage: How To Avoid A Future IT Crisis

Submitted by Amy Rizzo on Wed, 09/18/2024 - 17:54

When 8.5 million Windows devices, including those at airlines, banks and hospitals, suddenly displayed the “Blue Screen of Death,” people began to panic. “We are under a cyber-attack!” most speculated. Fortunately, that was not the case, but the real reason behind the outage is alarming and something every business owner should be concerned about.

10 Warning Signs Of Medical Fraud And How To Protect Yourself

Submitted by Amy Rizzo on Tue, 09/10/2024 - 06:28

Health insurance is designed to provide access to necessary treatments, preventive services and emergency care to individuals and families in need, and, apparently, now it’s also used to hand out paydays to scammers.

In February of this year, Change Healthcare fell victim to a cyber-attack that impacted thousands of health care providers, insurers and policyholders nationwide. Reports from this incident suggest that around 50% of all US medical claims could be at risk! To put that into perspective, if you’re in the waiting room with nine other people, there’s a good chance that five of you could fall victim to medical identity theft within the year. The aftermath of this fraud is staggering, affecting countless individuals and their access to health care. Once your medical information is exposed online, these identity thieves can use it to file false claims, buy expensive prescriptions and more, and it will all be conveniently billed to your account.

Recent Cyber-Attacks Highlight The Urgency Of Strong Cybersecurity For All Businesses

Submitted by Amy Rizzo on Tue, 08/27/2024 - 12:09

If the software your organization used to close deals and pay employees unexpectedly went down and you had no idea when it would be fixed, what would you do? Could you continue doing business? How much money would you lose? Unfortunately, in June, this happened to over 15,000 US- and Canada-based car dealerships when two cyber-attacks occurred on the popular industry software provider, CDK Global.

This software attack shut down the sales, financing and payroll systems for thousands of dealers, forcing them to either stop business or revert to the old-fashioned pen-and-paper method. This incident should be a wake-up call for all small business owners, highlighting the importance of robust cybersecurity measures.

Vacation Travel Scams Are Up 900%

Submitted by Amy Rizzo on Tue, 08/20/2024 - 11:23

Summer is a popular time for vacation travel. If you’re looking to squeeze in any last-minute travel, there is a scam circulating that you need to be aware of. As costs for everything from food to travel continue to increase, the logical step is to search for the best deals online to book a memorable trip without breaking your budget. According to Booking.com, cybercriminals have decided to capitalize on this need and are now using one scarily convincing, AI-generated phishing e-mail that can cost victims way more than their vacation fund. Booking.com’s CISO, Marnie Wilking, shared that the organization has seen a 500% to 900% increase in travel-related scams in the past 18 months using this malicious tactic.

Subscribe to

2023 Tech Tips CTA

Manage, Optimize, Improve infographic circle
MANAGE
We take time to understand your business goals and challenges.
OPTIMIZE
We integrate technology to provide a customized solution.
IMPROVE
We back it all up with responsive support and helpful user training to ensure the solution delivers the promised results.
Sharp Multifunction Printer
Working with Kim & TC Technologies has made my job of ordering toner much easier.
Bob | Purchasing Manager, Human Services Organization