The 411 Blog

Cybersecurity is a broad topic. It not only covers information technology and data protection, but it also addresses privacy, operational procedures, and policies. The 411 Blog covers all of that and more. From new trends in data protection to new tactics used by fraudsters to advice on what to do when things go wrong, The 411 has you covered with up-to-date information and advice.


With spring in full swing we are all looking forward to warmer weather, flowers blooming . . . and cleaning? Yes, there’s a good chance your weekend plans may include the annual scrubbing, sweeping, and decluttering of your home so you can just relax and enjoy the warmer weather and flowers blooming with little worries....

Oh great! Your phones been infected. You cannot make calls, you get a text every 30 seconds telling you to pay someone 2 Bitcoin or else they will release photos… and Siri only tells you to turn left at the next stoplight. What happened? Why is your phone acting so weird? Is it just old?...

Traditional phishing is what we refer to as the “spray and pray” phishing attack because it’s usually a mass email that goes to thousands of individuals in hopes that a few will fall for the scam. Spear phishing targets specific individuals instead of a huge group and often research their victims on social media to...

Mobile devices like laptops, smartphones, and tablets are everywhere. And the technology in these devices is advancing at an amazing rate. And as a result, to stay on top of the latest technology and most recent improvements, you may be replacing your devices every year or two. But do you ever think about all your...

“Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Most commonly, malware is designed to give attackers access to your infected computer. That access may allow...