Pink Hat Technology Management

Blog

Tech Support Scammers Increase Success with Call Optimization

Like legitimate call centers, tech support divisions, and organizations with inbound calling, scammers are using call optimization to improve callback success rates in tech support scams. For years, organizations have used web code to localize phone numbers based on the ...

The Steep Cost of Poor IT Security [CHART]

Did you know that the average total cost of a successful cyber-attack is over $5 million? Yup, you read that right—actually, $5,010,600 to be exact. Cyber security is not only getting more difficult for businesses to manage, it’s getting much ...

Snail-Mail Phishing with a CD as Bait

Via KnowBe4 Blog Several state government offices in the US have received CDs by mail, infected with malware. It's a clumsy attempt, ...

How to Escape the Password Hell and Protect Your Online Information

By Joy Beland As a 20-year veteran of the IT industry serving small to medium businesses, one of the most frustrating challenges I see is how one tries to keep up with all of the passwords we create and use ...

THE RISE OF Internet of Things (IOT) RANSOMWARE

Internet of Things (IOT) Ransomware is a type of attack against an IoT device to gain control of the device’s functionality. While many smart ...

Firefox To Start Showing Ads On Tab Page

Before Google released its Chrome browser, Firefox felt pretty good about their arrangement.  They got a handsome reward in exchange for making Google.com their default search engine.  It was a win-win. ...

Employee Negligence – Your Organization's (bigger than you think) Nightmare

A new study shows a vast majority of C-level executives see employee negligence as one of their most pressing security risks. When ...

Facebook Messenger Getting Feature To Help With Fake Accounts

It's no secret that there are legions of scammers and spammers haunting the virtual halls of Facebook.  As the world's largest and most influential social networking site, it's a natural target, ...

3 Ways to Boost Mobile Security

Set a pin or passcode. This is your first line of defense. If someone wants to access your device, they will first need ...

LAW ENFORCEMENT - A DISRUPTIVE FORCE

Arrests of key malware and exploit kit authors in 2017 are now making a significant dent in the scale, volume and success of cyberattacks. ...

Contact

Pink Hat Technology ManagementPink Hat Technology Management Logo $$$

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn