As the name suggests, an influencer is someone whose opinions influence a large social media audience. While influencers usually attract sponsorships from legitimate brands, these accounts can also be used as a tool for cybercriminals. Instagram influencers often host special giveaways to raise brand awareness. Typically followers are asked to comment on the post for...
Google recently removed a number of dangerous mobile applications (apps) from the Google Play store. These were disguised as generic VPN and audio control apps that appeared to be safe, but once installed, they tricked victims into allowing downloads from untrusted sources. If you download a disguised app and fall victim to this scam, a...
Earlier this month, cybercriminals impersonated the largest brokerage regulation company in the US: the Financial Industry Regulatory Authority (FINRA). Seeing such a vital organization be used as phish bait is chilling. Fortunately, if you know what to look for, this scam is easy to spot! The phishing email starts with the vaguely-startling subject line “ATTN:...
The gap created without a correlation between technology and business strategy could dilute the positive impacts technology can have on your business. Jeff Gorman | President | Connect with Jeff on LinkedIn The frequent pace of technology change is a consistent challenge for most companies. Lifecycles of hardware and software are short. The time span...
The average data scientist spends 70% of their time procuring and cleaning data. Will Hawkins, PhD – Data Scientist, Data Strategy Group | Connect with Will on LinkedIn If you work around data scientists or analysts, you’ve likely heard the phrase “dirty data”. Dirty data often slows down analysts and scientists in their initiatives to...
LinkedIn is a networking site used to connect with colleagues, employers, and other business contacts. Even though LinkedIn is designed for professionals, it is just as vulnerable as any other social media platform. In a recent scam, cybercriminals use stolen LinkedIn accounts to message the contacts of those accounts. The message includes a link to...
Standardization is about utilizing technology to eliminate inconsistency, redundancy, and ambiguity in your systems and processes. Tena Kay – Business Unit Director, Java/MidrangeConnect with Tena on LinkedIn In the recent article “Digital Transformation Starts with Process”, my colleague Rob Wilson emphasized how the pillars of an organization (its people, processes, and information) are empowered through...
Many of us are used to receiving messages from shipping companies, so cybercriminals use similar emails as phish bait. Let’s take a look at a recent shipping-themed phishing attack and see if you can spot the red flags: Sent from “Dhl Express,” the email claims that you have something waiting for you at your local post...