How to prepare MSPs for advanced phishing without wearing out IT staff

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection. When cybersecurity experts and vendors describe phishing attacks, they usually split them into two big groups. The first group consists of spam campaigns targeting a broad general audience with simple fraudulent messages. … More How to prepare MSPs for advanced phishing without wearing out IT staff

Bitcoin scams, hacks and heists – and how to avoid them

Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe. Bitcoin is on a tear. The world’s largest digital currency by market cap passed its previous record value of nearly $69,000 in early March. It’s now worth an estimated $1.3 trillion. Yet the fluctuating value of cryptocurrency doesn’t necessarily correspond to … More Bitcoin scams, hacks and heists – and how to avoid them

How to time limit your child’s apps

Endless scrolling on social media may be addictive.​ What can be done about it? In a previous article “Digital addiction: How to get your children off their screens” we wrote: “Children, just like adults, tend to spend a little too much time on their phones. Who can blame them? We, grown-ups, often do that ourselves, after … More How to time limit your child’s apps

Borrower beware: Common loan scams and how to avoid them

Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan. Times have been tough financially for many of us since the pandemic. Climate shocks, food and energy price rises and persistent inflation elsewhere have squeezed household spending and … More Borrower beware: Common loan scams and how to avoid them

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe. Our lives are increasingly lived in the digital world. And while this comes with a host of benefits, it also exposes us to the threat of data theft. Whether it’s sensitive … More How to share sensitive files securely online