CBOSS - Blog

Safeguard Your Card: Best Practices to Avoid Fraud

[fa icon='calendar'] Aug 7, 2017 12:19:45 PM / by Mike Lendvay

[fa icon="comment"] 0 Comments

Electronic payments are a vital part of doing business in almost every industry. They are central to how companies interact with each other, their customers, and their vendors. But the speed and convenience of ePayments brings with it risks: identity theft, credit card fraud, or bank account fraud. To combat these risks, we would like to share with you some helpful tips to keep your financial information safe:

Read More [fa icon="long-arrow-right"]

Net Neutrality and the Battle for the Net

[fa icon='calendar'] Jul 14, 2017 9:24:13 AM / by Pat Vince

[fa icon="comment"] 0 Comments

Facebook, Amazon, and Netflix are among the largest websites that participated in the July 12th protest against the FCC's decision to submit a final proposal to reverse rules made in 2015, which would allow them to take more control of the web. Most action had been taken behind the scenes during this protest; however, the front page of Reddit.com, where this pop-up message had displayed painfully slow over top of the main content, had been the most visible.

Read More [fa icon="long-arrow-right"]

CBOSS Employee Earns CISSP Certification

[fa icon='calendar'] Jun 30, 2017 3:00:00 PM / by Doug Carr

[fa icon="comment"] 0 Comments

CBOSS is pleased to announce that one of our own, Mike Lendvay, has achieved the Certified Information Systems Security Professional (CISSP) certification.

Read More [fa icon="long-arrow-right"]

If Something Smells Phishy, It Probably Is

[fa icon='calendar'] Jun 19, 2017 4:43:45 PM / by Quay Hilverding

[fa icon="comment"] 0 Comments

“Phishing” is defined by the United States Computer Emergency Readiness Team (US-CERT) as “… an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques.”  Much like “fishing”, “phishing” also involves setting the trap and waiting for their potential victim to take the bait.

Phishing comes in many forms. The most common type of phishing attempts are in the form of an email.  However, victims could also be the target of spoofed social media accounts, malicious websites, or unsolicited phone calls.

Read More [fa icon="long-arrow-right"]

WannaCry About Skipping Updates

[fa icon='calendar'] May 15, 2017 3:44:06 PM / by Mike Lendvay

[fa icon="comment"] 0 Comments

WannaCry About Skipping Updates

Starting the end of last week, computer systems in over 70 countries across the globe were hit by virulent strain of malware going by the names Wanna Decryptor, Wcry, or Wanna Cry. Included in innumerable victims of this attack were many systems at the British National Health Service. The malware spread quickly through affected networks, encrypting all personal data and demanding a ransom in bitcoin equivalent to $300 per affected system.

Read More [fa icon="long-arrow-right"]