Catharsis Managed IT’s Blog
Tips, news, and insights from the IT industry
Tip of the Week: 5 Warning Signs of a Phishing Attack
Phishing attacks are a very common threat nowadays. Between the classic message from a supposed Nigerian Prince to a sudden and urgent email from the bank with attachment in tow, we’ve all seen our share of them. That’s the trick to stopping them—being able to spot them. Let’s go over five signals that a message
Three Tricks to Spot Phishing Attempts
Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack. In 2018, there was an increase in the prevalence of phishing attacks by 269 percent when compared to their prevalence in 2017. In addition, a full
Diagnosing a Man-In-the-Middle Attack
The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack
How to Turn a Security Risk into a Security Solution
Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like ransomware, on the other hand, could be a business-ender. When a lack
A Look at this Year’s Worst Cybercrimes
It’s fair to say that today’s organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.
Could Your Business Be a Victim of Targeted Ransomware?
If you were a cybercriminal, what would be your preferred method of launching a ransomware attack? Would you rather create a catch-all threat that could capture as many potential victims as possible, or a calculated approach to land a big one? Despite the proven results of larger ransomware initiatives, most cybercriminals have made the shift
Would Your Users Fall For These Social Engineering Schemes?
Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for