888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Identify (and Foil) a Phishing Attack

Tip of the Week: How to Identify (and Foil) a Phishing Attack

Phishing has been gaining notoriety in cybersecurity circles, as it has been used quite successfully in a variety of business infiltrations and data breaches. Many of the more well-known cyberattacks of the last few years were enabled by phishing. In order to protect your business’ interests, you and your team need to be able to identify these social engineering attempts. We’ll go over a few ways to do so for this week’s tip.

0 Comments
Continue reading

Which is Worse -- a Phishing Attack or a Data Breach?

Which is Worse -- a Phishing Attack or a Data Breach?

In the realm of cyberattacks, a data breach is perceived as one of, if not the biggest threat that a business can face. They are seen as so dangerous, in fact, that threats like phishing attacks are largely disregarded. However, data from a recent study suggests that this is the opposite of what should happen in a decision maker’s mind.

0 Comments
Continue reading

What Does a SMiShing Attempt Look Like?

What Does a SMiShing Attempt Look Like?

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

0 Comments
Continue reading

Your Politics Have Been Breached

From our Security Awareness Training Partner, KnowBe4 this is a huge breach with major consequences you need to be aware of.
 
Gizmodo reported on a blog post by IT Security company UpGuard which revealed the largest US voter data leak to date.
 

Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a publicly accessible Amazon server and was available for 12 days for anyone with the URL.

The 1.1 terabytes of data includes birthdates, home addresses, telephone numbers and political views of nearly 62% of the entire US population. UpGuard cyber risk analyst Chris Vickery discovered Deep Root’s data online last week.

Deep Root Analytics, a conservative data firm that identifies audiences for political ads, confirmed ownership of the data to Gizmodo on Friday.

But wait, there's more...

0 Comments
Continue reading

Tip of the Week: Every Employee Should Know How to Spot an Email Phishing Scam

Tip of the Week: Every Employee Should Know How to Spot an Email Phishing Scam

We’ve all heard of phishing scams: an email appears in our inbox, apparently from a Nigerian prince who needs a cash advance  to free up their own finances, and is willing to reward you with riches galore. However, this is just one (famous) example of a phishing scam. In order to protect your business, you need to be ready for all phishing scams, whatever they look like.

0 Comments
Continue reading

Tip of the Week: How to Handle an Obvious Phone Scam

Tip of the Week: How to Handle an Obvious Phone Scam

Let’s say that you’re going about your daily business when you receive a phone call from an unknown number. You never know who it might be, so you decide to answer it. The man on the other end of the phone has a thick accent and asks if you’re having trouble with your computer. Now that he mentions it, you might have sensed a slight slowdown with your PC. You decide to hear him out and see what he has to say.

0 Comments
Continue reading