Outsourced IT: Do You Need Your Own Staff?

Running a business is a full-time job, and small-to-medium sized businesses (SMBs) in particular can often find their in-house IT resources stretched to capacity. As a result, it’s difficult to devote the necessary time and effort to deploying and managing the latest business technologies. This is leading an increasing number of companies to outsource part […]

Vulnerabilities in Fax Protocol Let Hackers Infiltrate Networks via Fax Machines

By Catalin Cimpanu August 13, 2018 Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas. Named “Faxploit,” this attack targets the ITU T.30 […]

[Heads-Up] Warn Your Employees. This Is the Year That Sextortion Spear Phishing Is Skyrocketing..

[Heads-Up] Warn Your Employees. This Is the Year That Sextortion Spear Phishing Is Skyrocketing… Intrepid cyber-investigative reporter Brian Krebs noticed that a story published on his blog July 12 about a new sextortion-based spear phishing scheme—which uses a real password used by each recipient—had become his most-read piece since his site launched in 2009. He […]

Attacks Evolving – Phishing via XPS Files

Uptick in Phishing Attempts via XPS file extensions We’ve seen it time after time, malicious actors routinely attempt to confuse recipients of messages with obscure or lesser-utilized file extensions. Over the past month, some phishing attempts using xps files instead of the typical pdf or doc/docx formats have been captured by our filters.  The xps […]

SEND AND RECEIVE LARGE FILES SECURELY

A NEW PARTNERSHIP WITH LIQUIDFILES Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable. A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to […]

Turns out the Equifax hack was even Worse than we Thought

The largest breach of 2017 may have been even more serious than initially thought: The cybercriminals behind the Equifax hack accessed user data not previously disclosed by the company, including tax identification numbers, email addresses, and driver’s license information, The Wall Street Journal reported. The criminals behind the Equifax breach accessed user data not previously disclosed […]

Cisco Report: Bad Privacy, Cybersecurity Procedures Causing Companies To Lose Sales

A new report from Cisco showed that two-thirds of companies are currently losing sales because of their customers’ growing privacy concerns, which prolong the sales process. Similarly, bad cybersecurity practices are costing companies millions to hundreds of millions of dollars in repairing data breach damage, as well as lost revenue. 2018 – The Year Of […]

The device you’re using right now has a big security flaw — but you don’t have to panic

There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic. To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically […]

The 3 Organizing Principles of Digital Transformation

Find out how investing in human capital, getting value from data and aligning APIs can help your business transform. Why is it important for organizations to embrace digital transformation? Ask anyone who used to make their living running a video store, selling encyclopedias or driving a taxi. Consumer demands haven’t changed much: People still watch […]

Why Phishing Attacks Persist Despite Increased Awareness

Phishing attacks are not going away. They remained a steady tactic used by cybercriminals throughout the first half of 2017, according to the Phishing Activity Trends Report recently released by the Anti-Phishing Working Group (APWG), an international coalition of industry, government, law enforcement and nongovernmental organizations. In phishing attacks, scammers use fraudulent websites and false […]