TAP Into Technology | Blog

When Did Phishing Become a Social Problem?

Posted by Chris Bihary on 6/6/17 8:00 AM

In the world of technology, social media is starting to become king. Just think about this for a minute, 15 years ago, there was no Twitter, Facebook, Instagram or Snapchat.

Now, it seems every American is on one or all of these devices. Social media has become such a fabric in our culture that there isn’t a time when you don’t see someone walking with their head down looking at their phones.

Learn how social engineering is the new gold mine.

Read More

Topics: Network Security, Hacks and Data Breaches

[Get the Data You Want] How Education Can Avoid Being the Next Soft Hacking Target

Posted by Darrick Kristich on 6/1/17 8:00 AM

It’s hard to believe it’s been two years since we experienced the year of the healthcare hack. But now that attention has shifted to that industry, hackers are doing their best to identify the next soft target.

Over the last year or two, attacks against the education sector have been on the rise. The problem is that there are a few unique challenges that make cyber security difficult for institutions from K-12 all the way through higher education.

Whether you’re worried about ransomware threats or advanced data breaches, it’s time to reinforce your security and compliance efforts with the help of an MSSP.

Read More

Topics: Network Security, Hacks and Data Breaches

Traveling this Summer? Don't Let Your Data Get Checked Out

Posted by Tim O'Neill on 5/23/17 8:00 AM

You probably really never think too much about it. You are on a trip and check into your hotel. After you get settled, you want to check your Facebook, email, Instagram and Twitter accounts. So, you will do what you have been doing every other time you check into a hotel, you click on the wifi that is given you to.

But, have you really ever thought about the information you are giving out over the web?


Read More

Topics: Network Security, Hacks and Data Breaches

Bad Bots, Bad Bots - They're Coming For You

Posted by Tim O'Neill on 5/11/17 8:00 AM

So, whatcha going to do when Bad Bots come for you?

According to a recent report by
Distil Networks, Inc.,the global leader in bot detection and migration, it seems like almost every website that has a login page has bad bots. Bad bots are the automated programs used by hackers, fraudsters and competitors to carry out a variety of activities.

To keep up on all the bad bot activity, Distil released its fourth bad bot report entitled “The 2017 Bad Bot report: If you Build it, They Will Come.” It is the most in-depth analysis on the levels of 2016’s bot activity.

Read More

Topics: Network Security, Hacks and Data Breaches

Espionage Barbie? Tech Toys Bring Whole New Meaning to Youth Privacy

Posted by Tim O'Neill on 3/30/17 8:00 AM

Technology has created a never-ending battle between security and privacy. We want technology to make our lives as convenient as possible. And for the most part, we’re willing to give up a bit of privacy to make it possible.

We use Facebook. We let our Amazon Echo listen just in case we need something. We give Google a detailed record of our location data. People want privacy but not if it comes at the expense of innovation.

But what about when it comes to our kids?

Read More

Topics: Hacks and Data Breaches

2016 Security Breaches: The Reality from the Predictions

Posted by Tim O'Neill on 2/23/17 8:00 AM

At the beginning of 2016, I warned of key security threats that the world would face in the coming year.

As I look back at those predictions, I realize that there are still critical insights to be gained from the numerous attacks that occurred last year.

Read on to gather the lessons learned. 

 

 

Read More

Topics: Network Security, Hacks and Data Breaches