Patricia Bama Patricia Bama

🐡 Outsmart Online Outlaws! Recognize and Report Phishing.

Phishing attacks are a common tactic used by cybercriminals to deceive individuals into divulging personal information or downloading harmful attachments. In this blog, we explore how to recognize and report phishing attempts effectively, with tips on identifying suspicious emails. Additionally, we discuss the importance of promptly reporting phishing attempts to protect yourself and others. By understanding the warning signs and taking appropriate action, you can stay safe from phishing scams.

Read More
Patricia Bama Patricia Bama

🐡 Significantly Enhance Your Account Security with Multi-Factor Authentication

Enabling multi-factor authentication (MFA) for your organization adds an extra layer of security to protect sensitive data and accounts from unauthorized access. By requiring users to verify their identity through multiple factors, such as passwords, biometrics, or one-time codes, MFA significantly reduces the risk of data breaches and cyberattacks. Implementing MFA not only safeguards your organization's valuable information but also demonstrates a commitment to cybersecurity and enhances your reputation as a security-conscious entity. Enable MFA and strengthen your organization's security posture today.

Read More
Patricia Bama Patricia Bama

🐡 Passwords: Your Key to Online Security

Learn about the importance of strong passwords and password managers in securing your digital accounts. Explore the first key message of Cybersecurity Awareness Month and discover how to enhance your online security with long, unique, and complex passwords, and password manager tools. Keep your sensitive information safe and protected from unauthorized access.

Read More
Patricia Bama Patricia Bama

🐡 Ransomware gangs go small

New ransomware trend targets small to medium-sized businesses. Learn why SMBs are attractive targets and how they can enhance their resilience against cyber attacks. Explore the financial and reputational risks of data breaches and the importance of employee training in cybersecurity. Discover actionable insights for creating a cybersecurity strategy to protect your business. Stay proactive and adaptable to ensure a robust cyber strategy.

Read More
Jeff Nantin Jeff Nantin

🐡 Volt Typhoon targets Guam critical infrastructure

Microsoft has recently uncovered a stealthy and targeted malicious activity aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China that usually focuses on espionage and information gathering. Microsoft believes with moderate confidence that this Volt Typhoon campaign aims to develop capabilities that could disrupt critical communications infrastructure between the United States and the Asia region during future crises.

Read More
Patricia Bama Patricia Bama

🐡 PhaaS - Phishing-as-a-Service; RaaS - Ransomware-as-a-Service

Protect your organization from emerging cybersecurity threats like Ransomware-as-a-Service (RaaS) and Phishing-as-a-Service (PaaS). Stay ahead of the curve by educating your employees, regularly updating software, implementing a robust data backup and recovery plan, updating security policies, and staying informed. By taking proactive steps, you can reduce the risk of a successful cyber attack and keep your organization safe.

Read More
Jeff Nantin Jeff Nantin

🐡 The human firewall: Strengthening your organization’s weakest link

A staggering 80% of cybersecurity breaches can be traced back to human error. This statistic highlights that your employees may be the weakest link in your organization's cybersecurity defenses. To combat this, organizations need to build a strong "Human Firewall" by training employees to be aware of potential cybersecurity threats and how to respond to them.

Read More
Patricia Bama Patricia Bama

🐡 CMMC Compliance: Updates from the April Townhall Meeting

Stay informed about the latest updates on CMMC compliance from the April Townhall Meeting. Learn about the DoD's efforts to make cybersecurity implementable for small and medium-sized companies in the defense industrial base. Discover the certification process, the five levels of CMMC, and the resources available to help businesses achieve compliance. Don't miss out on this valuable information to ensure your company meets the requirements for DoD contracts.

Read More
Patricia Bama Patricia Bama

🐡 On the Growing Threat of Business Email Compromise

Business Email Compromise (BEC) is a growing cyber threat that targets businesses through their email systems. Attackers use social engineering techniques to deceive employees and gain access to sensitive information or initiate fraudulent wire transfers. With a significant increase in BEC incidents in recent years, organizations of all sizes need to implement strong email security protocols, conduct regular employee training on BEC awareness, and verify wire transfer requests. Protect your business from BEC attacks to prevent financial loss, reputational damage, and legal consequences.

Read More
Patricia Bama Patricia Bama

🐡 10 Years Ago: The Shocking Arrest of a Vietnamese Hacker on Guam Soil

Read about the rise and fall of Hieu Minh Ngo, an infamous identity thief turned cybersecurity advocate, in this captivating feature story. Discover how Ngo's cybercriminal activities led to his arrest and imprisonment, and learn how he is now using his unique experience to protect people and businesses in the world of cybersecurity. Don't miss this compelling tale of redemption and resilience.

Read More
Jeff Nantin Jeff Nantin

🐡 Don’t lose your data - Boardroom hot topics

After the 180 mph winds of Typhoon Pongsona, businesses are prepared, more than ever, to handle a natural disaster. We have procedures for keeping gas in our generators, batteries for flashlights, case of spam….hmmm where did those go? Business continuity plans were made, and emergency response committees were assembled. Often times, these plans do not have ransomware recovery measures built-in, and are due for a refresh.

Read More