centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
Tips and Tricks
Home Tips and Tricks Page 2
Data BreachNEWSPhishingRansomwareTips and Tricks

An Eruption of Zoom Meeting Phishing Attacks

An eruption of Zoom-themed phishing attacks over the Spring and Summer of 2020 has been uncovered by researchers at INKY. Most of the attacks are aimed at stealing credentials to services like Outlook and Office 365 by directing users to spoofed login pages.

Read More
Roland Rodriguez Roland Rodriguez August 17, 2020 0 Comments
86
NEWSRansomwareTips and Tricks

Forget Me Not!

Remember your MySpace account? Or when your significant other wanted you to create a TikTok account so that you could make fun videos – which happened once, and you realized you would never do THAT again. These accounts are all your identities floating around in cyberspace, waiting to be rediscovered and perhaps manipulated against…you.

Read More
Roland Rodriguez Roland Rodriguez August 13, 2020 0 Comments
71
Data BreachEmail ScamsNEWSPhishingRansomwareSecurityTips and Tricks

Attackers are using Scare Tactics to Take Advantage of People in 2020.

With the onset of COVID-19, there were a plethora of new opportunities for cybercriminals to take advantage of our uncertainties, fears, and overall lack of knowledge about this virus and how it was spreading. What we are finding is that malicious activity is spreading just as fast.

Read More
Roland Rodriguez Roland Rodriguez August 4, 2020 0 Comments
85
Data BreachEmail ScamsNEWSPhishingTips and Tricks

What is Phishing? How do I spot it?

In spite of advances in anti-virus protocols and detection technology, phishing attacks continue to increase in number and impact.

Read More
Mary Kemper Mary Kemper July 22, 2020 0 Comments
80
Data BreachEmail ScamsNEWSRansomwareSecurityTips and Tricks

Tips for Creating a Secure Password

Repeatedly using the same passwords or using ‘weak’ passwords can leave you vulnerable to hackers. If a hacker cracks your passwords, they could gain access to your social media accounts, bank accounts, emails, and other sensitive accounts that hold your confidential, personal data. If someone obtains access to this information, you could become the victim of identity theft. Therefore, creating a strong password is vital.

Read More
Mary Kemper Mary Kemper July 17, 2020 0 Comments
88
  • 1
  • 2
  • 3
  • 4
Recent Posts
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
  • Home Office Security – Never Too Late to Evaluate
Subscribe to our blog
We have lots of stuff for you to read.
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Most Viewed Posts
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved