by Jessyca Adams | Nov 1, 2024 | blueskyservicesonline, cybersecurity, technology
We all love social media; I sure know I do! Nothing like learning every little detail of our loved one’s lives and sharing back! Who knew Shelly’s favorite color was green? Mine is orange! She also got a new dog named Fluffy-Royal! Well, my little pup…looks just like...
by Jessyca Adams | Oct 25, 2024 | angler phishing, blueskyservicesonline, cybersecurity, malware, Man in the Middle, Phishing, pop up phishing, Vishing
In the world of phishing there are many “phishing” techniques in the sea! We could continue to show different forms of phishing. That use different tactics to get you to react, however all good things must come to an end! Here in Part 7, I want to review some of the...
by Jessyca Adams | Oct 18, 2024 | blueskyservicesonline, cybersecurity, malware, Man in the Middle, Phishing
“Man-in-the Middle” Everyone that uses the internet can be a target of Man-in-the-Middle attacks. The Internet of Things (IoT) and public Wi-Fi have become quite popular targets in this form of phishing attack. Any time a third-party intercepts network traffic, it can...
by Jessyca Adams | Oct 9, 2024 | angler phishing, blueskyservicesonline, Endpoint Protection, malware, Phishing
Angler phishing I am sure you use social media every day, ever complained in a post? Has the cable company not followed through with your complaint about your cable box not working? I have personally experienced the latter. Here, in part 5 of “An Understandable Guide...
by Jessyca Adams | Oct 2, 2024 | blueskyservicesonline, cybersecurity, malware, Phishing
What comes to your mind when I say pop-up? I am sure you have experienced a pop-up! Have you ever downloaded an application from the App Store? So, what happens? A pop-up appears asking for approval for the download. How about adding extensions to your browser,...
by Jessyca Adams | Sep 25, 2024 | blueskyservicesonline, cybersecurity, malware, Phishing
An Understandable Guide to The World of Phishing: Part 3 “Smishing” “You’ve got a message,” or your phone just “dings.” We all get text messages! Threat actors use text messages to trick you into providing them with your usernames and passwords for your...
by Jessyca Adams | Sep 18, 2024 | blueskyservicesonline, cybersecurity, Phishing, Vishing
In our last blog post, we learned that phishing is an old technique that comes to you in many different forms. We are all at risk of falling victim to this form of attack. Designed to steal your personal and/or financial information or gather information. Threat...
by Jessyca Adams | Sep 11, 2024 | blueskyservicesonline, Endpoint Protection, Phishing, ransonware, updates
Phishing in its many forms, I know of over 19 off the top of my head, is plain and simple. It is a redirect or a download that puts a program on your machine to allow threat actors access to your system. Redirects are called links. These are the highlighted and...
by Marc Vazquez | Sep 4, 2024 | BitLocker, blueskyservicesonline, cybersecurity, Endpoint Protection
Let’s look at BitLocker if all encryption is created equal, and if it is worth deploying. BitLocker was created in 2004 to protect information on devices if the drives were ever lost or stolen. This is done by encrypting and locking the drive upon boot-up. The best...
by Jessyca Adams | Aug 28, 2024 | BlueSky Services, hackers, malware, Phishing
In this blog I will walk you through what exactly a Progressive Web Application is and the dangers that can come with a world full of them. Progressive Web Applications are part of our everyday life. We use PWAs when searching for a ride or looking for our favorite...