Making seven saves against the NHL’s Winnipeg Jets is not in the job description of a “Senior Financial Accountant in the Greater Chicago Area,” especially a 36-year-old accountant who has never played in a professional hockey match. Regardless of job descriptions, and exceeding all expectations, that is exactly what Scott Foster accomplished. Foster, who iscontinue reading…
General
What Is “Porting?” A New Way For Thieves To Commit Identity Theft And Circumvent Two-Factor Authentication.
What Is Porting? Porting allows you to transfer your current mobile number over to a new carrier. It’s helpful because it frees you from having to inform all of your current contacts about your new phone number, which, depending on how many contacts you have, can be a tedious and time-consuming process. Circumventing 2FA Unfortunately,continue reading…
Tech Support Scams Are A Legitimate Threat To Your Cybersecurity
Tech Support Scams & Cybersecurity Recently, a member of our marketing team was dealing with Microsoft customer support. He called the support number and was connected to a tech support employee that requested remote access to his computer in order to address the problem. It caused him some concern, and rightfully so. “Tech support” scamscontinue reading…
What Can You Do To Protect Against Malicious Websites & Phishing Emails?
To wrap up our month-long Kellam’s Tech Tips Cybersecurity Awareness blog series, I want to talk about two things: How to protect against malicious websites. Ways to detect phishing emails that are sent to your email address. Malicious Websites & Malware Often, you are invited to visit a website from a stranger or a friend. If thesecontinue reading…
Are Your Online Accounts Protected By Two-Factor Authentication?
The first installment of Kellam’s Tech Tips blog series focused on cybersecurity awareness and discussed the importance of strong passwords in protecting your sensitive information. However, as thieves employ more advanced tactics to decipher them, even strong passwords are becoming more vulnerable. Additional layers of protection are strongly recommended. That brings us to the topic of our thirdcontinue reading…