by Leeanna Raposo | Jan 8, 2020 | Articles
Next generation malware has flipped today’s threat landscape on its head. The wormable nature of new threats makes removal extremely difficult with reinfection often occurring moments after a system is cleaned. Emotet and Trickbot are two trojans that recently...
by Leeanna Raposo | Jan 3, 2020 | Articles
It’s that time of year—the time when the “new” wears off and people with good intentions everywhere start to flake on their New Year’s resolutions. Business leaders are not immune—we can also get caught up in the hustle of day-to-day operations and lose sight of our...
by Leeanna Raposo | Dec 17, 2019 | Articles
Article based on and adapted from Christopher Hadnagy’s “Science Behind Human Hacking” presentation at the Compass Cybersecurity Symposium, Twin River Event Center – 9/27/19 What is Social Engineering? Social engineering is the psychological manipulation of convincing...
by Leeanna Raposo | Nov 11, 2019 | Articles
Attackers want to trick victims into opening and responding to emails. To increase the success of their attacks, they will design the email to look like it came from someone the target knows, including their boss! Business email compromise (BEC) is a rapidly growing...
by Leeanna Raposo | Oct 8, 2019 | Articles
IT Support RI is now a member of the Rhode Island Joint Cyber Task Force! Formerly known as the Cyber Disruption Team, the Rhode Island Joint Cyber Task Force (RIJCTF) was formed in 2009 to respond to threats and protect the state’s cyber infrastructure. The Task...
by Leeanna Raposo | Sep 27, 2019 | Articles
Imagine walking into your business one day and being unable to access or read any of your files. No matter what you do, every single file on your computer contains a bunch of indecipherable symbols. While you start panicking over the fate of all your files, you notice...