Pink Hat Technology Management

Blog

Scammers posing as legit companies

You can’t trust anyone on the phone these days!  When Joy does her live Security Awareness Training for client businesses, one thing she talks about is how scammers pose as real vendors and call businesses to obtain access to their ...

What happens when a company laptop is stolen?

By Joy Beland More and more of our clients are using company laptops just like our techs; loaded with important company data and important to protect.  Recently, a client had two staff members out of town, and their rental car ...

Alexa Now Makes It Easy To Donate To Charity

Amazon has made a small but significant change to its Alexa service, which now makes it possible to donate to charity by issuing voice commands. So far, there are 48 charities ...

Why human vulnerabilities are a higher cyber security risk than software flaws

Jonathan Greig at TechRepublic wrote an article based on recent Proofpoint research: "According to cybersecurity firm Proofpoint, the 'vast majority' of digital attacks aimed to exploit the "human factor" through phishing attempts and related ...

How to spot a fraudulent email?

Often times you will receive an email from an unknown sender, with attachments or links in it and you will not know for sure if that is a legitimate email, safe to open and click. It has happened to all ...

Signal App - Privacy that fits in your pocket

We have just returned from an IT Security conference in Nashville, where Kevin Mitnik (the world’s most famous hacker) was one of the keynote ...

Facebook’s Privacy Issues

(Via Sans.org) Facebook has been in the news extensively about several privacy issues and violations, one of the biggest being the records of over 50 million ...

Freedom to break away from Password Terror

By Joy Beland For three years now, I’ve been roaming LA with my Security Awareness Training presentation and asking everyone who attends to learn how to create a complex password, and never to save them on sticky notes or in ...

Scam Of The Week: Clever Gmail Phishing Scam You Need To Know About

Twitter user @_thp shared a recent phishing scam that they received; and it’s so fiendishly clever that it’s gone viral. They wrote: "This is the most clever phishing scam ...

5 Ways to Spot A Social Engineering Attack

By Joy Beland “I’m not going to make payroll – we’re going to close our doors as a result of the fraud.” ...

Contact

Pink Hat Technology ManagementPink Hat Technology Management Logo $$$

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn