Every year, the holiday season proves to be the busiest couple of months for essentially everyone, even for cybercriminals and their online shopping scams.
In fact, we could say “especially for...
Email scanners are an important piece of technology used to automatically detect and reroute potential threats (like a phishing attack) that attempt to infiltrate your inbox from unknown and/or suspicious...
Does your organization use Google Docs to accomplish work? Do you frequently send and receive documents to and from people outside of your organization? If you answered “yes,” then you...
If you’re a frequent visitor to the Blue Layer blog, then you’ve likely become quite familiar with phishing and are quickly becoming an expert at identifying what it looks like....
It never fails: just when you feel like you have a grasp on current cybercrime trends, hackers are already coming up with something new that you have to worry about...
Try, for a moment, to remember a time before deepfakes—when technology had not yet allowed us some of the everyday conveniences that we enjoy today: when you could not order...
It might be difficult to remember a time before MFA when you didn’t have to receive a text or email code beyond a normal password to get access to your...
The COVID-19 pandemic’s impact on the workplace is something that no one could have seen coming. For many businesses, a typical day at the office has become a thing of...
As a reliable technology partner, it’s our job to help your business identify all types of attacks that pose a potential threat to you, your employees, and the information systems...
Taking the path of least resistance when it comes to passwords is something we’re all guilty of. If they check all of the required boxes, are as uncomplicated as possible,...
Much in the same way that cybercriminals have targeted remote workers throughout this pandemic, they have also set their sights on other unsuspecting victims by various means. This time, the...
With phishing scams continuously evolving and becoming more and more clever, email remains the bad guys’ favorite tool to use when going after unsuspecting and unaware cyber victims. It’s an...
Cybercriminals' Biggest Target: Working from Home
As a business owner who is continuously working to protect your most valuable information, you know firsthand just how important it is to prioritize effective...
COVID-19 Cybersecurity Scams to Look Out For
As long as vulnerabilities in technology exist, you can count on scammers to take full advantage of them and as one might expect, the...
5 Tips to Keep Your Tax Data Secure When Filing Online This Year
At Blue Layer, our priority is assisting and protecting our customers in any capacity that we can. Protection...
Service Spotlight: Disaster Recovery from Blue Layer
What is disaster recovery?
Disaster recovery should be a crucial part of every business plan. Essentially, it involves backing up your corporate data and making...
Chilling Cyber Threats: Cybersecurity Tips to Keep Your Data Safe
October is National Cybersecurity Awareness Month, created by the government and the IT industry to raise awareness of the resources available...
Beware of Office 365 Email Phishing ScamsThere is an Office 365 “Unable to Verify Subscription” phishing email that is being sent to Office 365 users. Do NOT click on the...
Vulnerability Warning: Intel CPU
By now you may have heard about the ‘Intel CPU Vulnerability’ and may have even started to receive emails from your Antivirus vendor with information regarding patching....
What You Need to Know About the Equifax Breach
This past week, big-three credit bureau giant, Equifax, was hit with a major breach of information, putting 143 million Americans at risk....
What You Need to Know About Two Factor Authentication
In the world of cyber and digital crime, internet security is becoming more prevalent in our lives. Regularly changing your passwords and...
What You Need to Know About "WannaCry" Ransomeware
As has been widely reported, a well-orchestrated ransomware attack swept the world this past Friday, wreaking havoc in over 150 countries. Hospitals had...
Google Doc Users Beware
For those who frequently use Google Docs, double and triple-check before opening, even if it appears to come from a trustworthy source. Anyone can be a victim....
Microsoft Ending Support for Windows Vista
For Windows users, the product lifecycle is no surprise. It begins when released and ends when support is no longer available. Support is available for...