Imagine IT (i)nsights

Imagine IT Insights

Office 365 beefs up anti-phishing measures

October 30th, 2018 Imagine IT 2018october30office_a, advanced threat protection, anti-impersonation, anti-spoofing, microsoft, office, office 365, phishing, safe links 2018october30office_a, advanced threat protection, anti-impersonation, anti-spoofing, microsoft, office, office 365, phishing, safe links

There are plenty of things to love about Office 365. For a small monthly fee, it gives you the latest cloud-based version of Microsoft Office apps and robust communication tools that improve collaboration and productivity. But it’s also an extremely secure platform that can defend against the most cunning phishing attacks.

Don’t let hackers fool you with these tricks

September 25th, 2018 Imagine IT 2018september25security_a, phishing, pretexting, quid pro quo, rio olympics, scams, Security, social engineering, tailgating 2018september25security_a, phishing, pretexting, quid pro quo, rio olympics, scams, Security, social engineering, tailgating

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business.

New Office 365 cyberattack on the loose

August 27th, 2018 Imagine IT 2018august27office_a, cyberattack, microsoft, office, office 365, outlook, phishing, scams, security, sharepoint 2018august27office_a, cyberattack, microsoft, office, office 365, outlook, phishing, scams, security, sharepoint

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works.

Ready for tax season phishing scams?

March 29th, 2018 Imagine IT 2018march29security_a, confidential, cyberthreat, data, information, phishing, scam, Security, security 2018march29security_a, confidential, cyberthreat, data, information, phishing, scam, Security, security

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web.

The importance of HTTPS

March 7th, 2018 Imagine IT 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Google studies effects of leaked logins

November 21st, 2017 Imagine IT 2017november21security_a, account hijacking, data breach, google, keylogging, multi-factor authentication, passwords, phishing, research, Security 2017november21security_a, account hijacking, data breach, google, keylogging, multi-factor authentication, passwords, phishing, research, Security

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.

Old Mac malware gets a facelift

July 27th, 2017 Imagine IT 2017july27apple_a, apple, cybersecurity, macos, malware, os x, phishing 2017july27apple_a, apple, cybersecurity, macos, malware, os x, phishing

In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank account information. Read on to learn what you can do to prevent an infection.

WannaCry: A historic cyberattack

May 25th, 2017 Imagine IT 2017may25security_a, cybersecurity, employee training, malware, perimeter security, phishing, ransomware, Security, software updates, wannacry 2017may25security_a, cybersecurity, employee training, malware, perimeter security, phishing, ransomware, Security, software updates, wannacry

New phishing protection for Gmail on Android

May 18th, 2017 Imagine IT 2017may18android_a, android, anti-phishing, gmail, google docs, mobile security, phishing, safe browsing, security 2017may18android_a, android, anti-phishing, gmail, google docs, mobile security, phishing, safe browsing, security

The most advanced Gmail phishing scam yet

May 10th, 2017 Imagine IT 2017may10security_a, cybersecurity, fancy bear, gmail, google, oauth, phishing, Security 2017may10security_a, cybersecurity, fancy bear, gmail, google, oauth, phishing, Security