How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s [...]

By | January 19th, 2016
Security Awareness|Comments Off on How to Protect Yourself from Identity Theft Tax Refund Fraud

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

Mobile Menace: Trends in Mobile Threats Infographic

By | August 11th, 2011
IT Infrastructure|Comments Off on Mobile Menace: Trends in Mobile Threats Infographic

InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]

By | July 18th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

Do you know which threats your Anti-Virus won’t stop?

News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds.  Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day.  Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]

By | April 21st, 2011
Industry InSights, IT Infrastructure|Comments Off on Do you know which threats your Anti-Virus won’t stop?

6 Sure-Fire Ways to Increase Mobile Security

6 Sure-fire Ways to Increase Mobile Security Mobile threats have risen by more than eight times over the past five years, with a sharp increase in 2010. After some 200,000 users downloaded infected mobile apps from the official app store Android Market, Google pulled more than 50 infected programs from the Market. In an effort to protect information on mobile devices, IT managers are increasingly becoming aware of the need to not only apply security [...]

By | March 26th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on 6 Sure-Fire Ways to Increase Mobile Security

Top Tech Threats & Trends for 2011

Twitter |  Facebook |  LinkedIn Top Tech Threats & Trends for 2011 Here at InfoSight, Inc. we have put together our take on what the key tech trends and threats of 2011 will be. We know as the technologies become faster and smarter so will the threats that follow them. The Social Engineering and Black Hat SEO we experienced in the previous year will still hold strong and continue to transform, and we’ll see a [...]

By | March 26th, 2011
IT Infrastructure|Comments Off on Top Tech Threats & Trends for 2011