Cybersecurity Awareness Month: Top Tips & Trends You Need to Know
It’s October, which means that (in addition to that cooler fall breeze) it’s Cybersecurity Awareness Month. Cybersecurity Awareness Month was created in October 2004 by the National Cyber Security Alliance and the U.S. Department of Homeland Security as a “collaborative effort between government and industry to ensure every American has
Read MorePhishing Attack Update: How Cybercriminals Can Bypass Email Scanners to Attack Your Business
Email scanners are an important piece of technology used to automatically detect and reroute potential threats (like a phishing attack) that attempt to infiltrate your inbox from unknown and/or suspicious sources. If you’ve ever had to “check your spam folder or quarantine” after a trusted source has sent you a
Read MoreBuying Bitcoin? Watch Out for These Common Phishing Attacks
You don’t have to look far to see that interest in bitcoin is on the rise and in the news more and more every day. All this talk of “wallets,” “meme coins,” and “mining” is sure to have caught your attention at one point or another, leading you to wonder
Read MoreBeware of These Google Docs Scams
Does your organization use Google Docs to accomplish work? Do you frequently send and receive documents to and from people outside of your organization? If you answered “yes,” then you might be at risk for another new phishing scam that exploits another familiar tool that your team is accustomed to
Read MoreBlue Layer Ranks No. 3571 on the 2021 Inc. 5000 List
Inc. Magazine has revealed that Blue Layer is No. 3571 on its annual Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment—its independent small businesses. “Every year, the
Read MoreBlue Layer Climbs 45 Spots to Rank #99 on Channel Futures MSP 501 List
For the eighth consecutive year, Blue Layer has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 15 years, MSPs from around the globe have submitted applications to be included on this prestigious and definitive list. The
Read MoreBreaking Down Cybersecurity with Blue Layer: What is Spear Phishing?
If you’re a frequent visitor to the Blue Layer blog, then you’ve likely become quite familiar with phishing and are quickly becoming an expert at identifying what it looks like. Today, we’re expanding that base of knowledge by digging deeper into a specific brand of phishing called “spear phishing.” First,
Read MoreIs Your Business at Risk of a Vendor Email Compromise (VEC)?
It never fails: just when you feel like you have a grasp on current cybercrime trends, hackers are already coming up with something new that you have to worry about protecting yourself from and educating your employees about. This week, we’re talking about vendor email compromise (VEC). What is a
Read MoreCybersecurity Alert: Beware of Video Verification Deepfakes
Try, for a moment, to remember a time before deepfakes—when technology had not yet allowed us some of the everyday conveniences that we enjoy today: when you could not order things and receive them the same day; when you could not have a face-to-face conversation with anyone, anywhere at the
Read MoreWhat You Need to Know About MFA & How to Hack It
It might be difficult to remember a time before MFA when you didn’t have to receive a text or email code beyond a normal password to get access to your accounts. But once upon a time, logging in was as simple as 1.) identity 2.) password 3.) entry. The evolution
Read More