Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Causes Most Data Breaches?

What Causes Most Data Breaches?

A data breach is no joke, and it can take many forms. Whether it’s a case of confidential data being viewed, copied, stolen, or destroyed, a data breach cannot be ignored. Let’s take a look at some of the various causes of business data breaches and what you can do to prevent them from sinking your organization.

0 Comments

Facts that Will Help You Identify Phishing Attacks

Facts that Will Help You Identify Phishing Attacks

Phishing messages are one of the scarier threats out there, especially when you consider that they force you to be on edge about most messages you receive, regardless of how sound they might appear to be. Thankfully, there are various telltale signs that you can look for when analyzing the messages you receive on a daily basis that can clue you in on some of the more suspicious phishing messages.

0 Comments

5 Most Dangerous Strains of Ransomware, Based on How Profitable They Are for the Bad Guys

5 Most Dangerous Strains of Ransomware, Based on How Profitable They Are for the Bad Guys

There are all kinds of threats out there that can make things difficult for your business, but one of the biggest threats from this past year was ransomware. Ransomware encrypts data on the victim’s device so that it is inaccessible without the decryption key. Hackers have been successful with these extortion methods, as well as many others, yet ransomware continues to be a serious source of anxiety for businesses of all sizes and industries.

0 Comments

Are Ethical Hackers the New Defense Against Cybercrime for Small Businesses?

Are Ethical Hackers the New Defense Against Cybercrime for Small Businesses?

While considering cybercrime, it’s very easy to slip into a dichotomy: hackers are bad, while not-hackers are good. Like most things in life, however, the truth is that there is a spectrum to cybercrime. Let’s take a few moments to consider a few different types of hackers, and the hats that their roles determine they wear.

0 Comments

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

0 Comments

3 Ways to Tell That You’ve Been Hacked

3 Ways to Tell That You’ve Been Hacked

There are many different types of hacking attacks, but those targeting your computer can either be incredibly intrusive or so low-profile that you don’t even know you’ve been infected until it’s too late to do anything about it. Let’s discuss some of the telltale signs of a hack and what you should look for to prevent or identify them.

0 Comments

FoggyWeb is the Latest Malware to Wreak Havoc

FoggyWeb is the Latest Malware to Wreak Havoc

The attack on SolarWinds earlier this year caused a lot of challenges, and now that time has passed and the dust has settled somewhat, Microsoft has uncovered another type of malware associated with the attack. This one is called FoggyWeb. What does this threat do and what can we learn about it?

0 Comments

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

0 Comments

New Report Finds that A Third of Employees Will Fall for Phishing Scams

New Report Finds that A Third of Employees Will Fall for Phishing Scams

Hackers are a crafty bunch. They will use any and all means to infiltrate businesses, including some that are downright shameful. One of the most devastating ways that hackers make these attempts is through the use of phishing attacks, or attacks where they essentially trick users to click on links in emails or hand over confidential information.

0 Comments

What the Irish Health Service Disruption Proves About Data Restoration

What the Irish Health Service Disruption Proves About Data Restoration

This past May, Ireland’s Health Service Executive—the organization responsible for providing healthcare and social services to the country’s residents—was successfully targeted by a major ransomware attack. Unfortunately, we are still talking about it now because the entire situation has forced us to acknowledge the aftereffects of such an event.

0 Comments

Do You Know What Disasters Could Befall Your Business?

Do You Know What Disasters Could Befall Your Business?

Disasters are not something relegated to specific locations or industries. All organizations are susceptible to a data loss disaster or two, no matter which category they fall under. As a business owner, it should be your prerogative to protect your company from the various disasters that could create downtime, destroy data, and disrupt operations.

0 Comments

Meat Packers On the Wrong End of Malware

Meat Packers On the Wrong End of Malware

Once again, ransomware strikes, this time targeting the world’s largest meat processor and distributor, JBS S.A. This disruptive cyberattack forced the company to suspend operations in both North America and Australia, a move which had devastating consequences to the supply chain. What can we learn from this situation?

0 Comments

We All Need to Watch Out for These Common Phishing Attacks

We All Need to Watch Out for These Common Phishing Attacks

Hackers are always taking advantage of others’ misfortunes, and they have even gone so far as to leverage the COVID-19 pandemic in efforts to launch phishing attacks. How have hackers utilized this worldwide disaster to their benefit, and what can we do to keep our organizations secure in this troubling time? Let’s find out.

0 Comments

A Few Ways Unpatched Software Can Hamper Your Business

A Few Ways Unpatched Software Can Hamper Your Business

Anyone who uses a computer regularly knows that software can be finicky. Developers continuously update their software to account for changes in security threats and to add new features. For the small business, integrating and developing software can be useful, but it can also be one of the most problematic issues you can face; and, oftentimes it can often go under the radar. Let’s look at a few ways that old software bugs can cause problems for your business.

0 Comments

Cyberattacks are Happening Faster with Less Time for Early Detection

Cyberattacks are Happening Faster with Less Time for Early Detection

In what sounds like a positive shift, cybersecurity experts have announced their research has found that cyberattacks are spending less time on the networks they infiltrate. Unfortunately, this isn’t such a clear-cut positive. Today, we’ll discuss “dwell time” and how less of it is a problem. 

0 Comments

This Is How to Avoid Phishing Scams

This Is How to Avoid Phishing Scams

For many businesses, email plays a crucial role in the dissemination of information. Whether it is simply interacting with clients or pushing directions to individuals, email is a simple and efficient way to communicate. One problem that organizations are running into is that individuals are being inundated with social engineering messages called phishing. This strategy is causing major operational problems for businesses, from malware to data breaches to extended downtime. Let’s identify what exactly phishing is and how it is used to the detriment of many businesses and other organizations.

0 Comments

Considering the Current State of Phishing

Considering the Current State of Phishing

We will never pass up the opportunity to draw attention to the importance of cybersecurity awareness, as it is a crucial element for any business to consider. One serious issue that has caused significant stress amongst businesses is phishing. Let’s consider some recent statistics to evaluate where we stand right now, specifically in terms of the prevalence of phishing attacks.

0 Comments

The Existential Problem with Continued State-Sponsored Cyberattacks

The Existential Problem with Continued State-Sponsored Cyberattacks

Cyberattacks have been carried out by nations for decades, but for whatever reason, our minds still build the hoodie-wearing cyberpunk sitting at a laptop in a dimly-lit room. This often isn’t the case. Today, we thought we would shine a light on state-sponsored hacking, starting with the attack carried out recently against the U.S.-based cybersecurity company FireEye.

0 Comments

What’s Happening with COVID-19 Scams

What’s Happening with COVID-19 Scams

During the COVID-19 pandemic there have been quite a few different types of scams. At first, most of the scams centered around economic relief money that was doled out to people to help prop up the fledgling economy. More recently however, scammers have focused on vaccines. Today, we will take a closer look at some of these scams, as they are growing in sophistication. 

0 Comments

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you whatever supplies you need, your team to complete their responsibilities without letting in threats, and your customers to turn to you for what they need. Unfortunately, cybercriminals are willing to take advantage of such trust to accomplish their own ends.

0 Comments

Blog Archive

2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code

Contact us

Learn more about what Ferrum Technology Services can do for your business.