Planning for Windows 10 End of Support: What You Need to Know
As October 14, 2025, approaches, businesses need to prepare for the end of support for Windows 10. Microsoft has announced that after this date, they...
According to a report from Microsoft, COVID-19-themed cyber attacks spiked to nearly a million a day during the first week of March 2020.
Now-a-day’s it’s very easy to find out via social media, names and titles of personnel within a company. Business Email Compromise (BEC) targets employees with access to company funds through compromised accounts belonging to CEO’s and senior management. Typically, hackers target businesses that process a lot wire transfers, with the goal of using social engineering to send money to the attacker or using malware to gain access to computers used by financial decision makers to then wire themselves money.
With the global pandemic, hackers are adapting their phishing campaigns using COVID-19 themed emails and even text messages. Messaging such as “due to the Coronavirus outbreak and precautions, please redirect all invoices to the following bank account..” Or referencing the federal government stimulus payments in order to get the user to click a malicious link and then infect their machine with malware.
Essentially, the scammers target a specific company, create spoof domains and emails, spend a ton of time gathering intel and sorting through innumerable emails between the compromised mailbox and third parties including their bank, identifying contacts at the bank and either intercept or start new wire transfers.
Teknologize has clients throughout the Pacific Northwest with offices located in the Tri-Cities, Washington 509.396.6640 and Bend, Oregon 541.848.6072.
As October 14, 2025, approaches, businesses need to prepare for the end of support for Windows 10. Microsoft has announced that after this date, they...
Imagine the sudden chaos when 8.5 million Windows devices - spanning industries like airlines, banking, and healthcare - began displaying the dreaded...
In today's digital landscape, many businesses operate under the assumption that their IT networks are secure because everything seems to be running...