by Jessyca Adams | Sep 25, 2024 | blueskyservicesonline, cybersecurity, malware, Phishing
An Understandable Guide to The World of Phishing: Part 3 “Smishing” “You’ve got a message,” or your phone just “dings.” We all get text messages! Threat actors use text messages to trick you into providing them with your usernames and passwords for your...
by Jessyca Adams | Sep 18, 2024 | blueskyservicesonline, cybersecurity, Phishing, Vishing
In our last blog post, we learned that phishing is an old technique that comes to you in many different forms. We are all at risk of falling victim to this form of attack. Designed to steal your personal and/or financial information or gather information. Threat...
by Jessyca Adams | Sep 11, 2024 | blueskyservicesonline, Endpoint Protection, Phishing, ransonware, updates
Phishing in its many forms, I know of over 19 off the top of my head, is plain and simple. It is a redirect or a download that puts a program on your machine to allow threat actors access to your system. Redirects are called links. These are the highlighted and...
by Marc Vazquez | Sep 4, 2024 | BitLocker, blueskyservicesonline, cybersecurity, Endpoint Protection
Let’s look at BitLocker if all encryption is created equal, and if it is worth deploying. BitLocker was created in 2004 to protect information on devices if the drives were ever lost or stolen. This is done by encrypting and locking the drive upon boot-up. The best...