Call Us (860) 577-8060

Phishing Archives - Sound Computers | Westbrook, CT

blog-img


Cybersecurity is a constantly evolving field. There are new threats, technologies and opportunities emerging every year. As we enter 2024, organizations need to be aware of current and future cyber threats. Businesses of all sizes and sectors should plan accordingly.

Read More
blog-img


Imagine that you are going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They are out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six $200 gift cards and text the information right away. This can't be a scam because it is from the boss.

Read More
blog-img

6 Reasons to Start Using Phishing-Resistant MFA for Better Security

As the digital world evolves, the threats it faces also evolve. Despite its seemingly innocuous name, phishing is considered to be one of the most dangerous cybersecurity threats facing businesses today. The sophistication of phishing attacks (which entail various fraudulent attempts to obtain user information, credit card numbers and passwords) is continuously on the rise.

Read More
blog-img


It seems you can’t read an article on cybersecurity without the word phishing coming up. That is because phishing is still the number one delivery vehicle for cyberattacks.

A cybercriminal may want to steal employee login credentials or wish to launch a ransomware attack for a payout. They may possibly plant spyware to steal sensitive info. Sending a phishing email can do them all.

Read More
blog-img


There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches and more launch via a phishing email.

Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve their methods as technology progresses. For example, they use AI-based tactics to make targeted phishing more efficient.

Read More
blog-img


You have completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link.

Read More
blog-img

What's a Reply-Chain Phishing Attack?

Companies had to deal with more than just COVID complications last year as they faced brutal cyber-attacks. In fact, a new type of phishing attack was discovered after the furniture giant IKEA noticed several malicious reply-chain emails making rounds in the company. While IKEA was able to protect itself against the attack, many companies are still unaware of the lurking danger. 

Read More
blog-img


Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email. However, social phishing has been growing rapidly.

Read More