Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

How Smart Employees Fall for Cybersecurity Scams

How Smart Employees Fall for Cybersecurity Scams

It doesn’t matter how big or small your business is, whether you are a nationwide or global entity or a small local business in Baltimore or Bel Air; cybersecurity is a critical issue for your business. Cybercrime is a lucrative business, and the bad guys are doing a great job at making it extremely challenging to dodge their traps.

0 Comments
Continue reading

XLoader Android Malware Runs in the Background and Steals Your Data

XLoader Android Malware Runs in the Background and Steals Your Data

Mobile malware isn’t common, but it’s growing increasingly more so. You may have heard of a malware called XLoader, which has been used to victimize people in over seven countries. This mobile threat has seen various iterations over the past several years, but you should be especially concerned these days.

0 Comments
Continue reading

This Malware is Impersonating Popular Business Software

This Malware is Impersonating Popular Business Software

Cybercriminals are always looking for new ways to trick users and businesses into falling for their traps. With cyberthreats on the rise, and online risks becoming more detrimental to businesses, it’s definitely something that all businesses need to have protections in place for.

A new attack involves ransomware being disguised as some of the most prominent business-related software tools.

0 Comments
Continue reading

Listing Some of the Worst Scams Your Business Could Deal With

Listing Some of the Worst Scams Your Business Could Deal With

Small businesses, like any other entities, can be vulnerable to various computer scams. Scams can have an unsettling effect on how your business runs, as it always keeps doubt—even if you do everything you can to mitigate risks—to whether you are going to be the victim of a horrible Internet-based scam. Here's a list of common computer scams that small businesses should be aware of.

0 Comments
Continue reading

Cybercriminals are Using QR Codes to Infiltrate Businesses

Cybercriminals are Using QR Codes to Infiltrate Businesses

QR codes have become a popular tool for businesses to quickly and easily share information with customers. However, cybercriminals have found a way to exploit this technology for their own malicious purposes. In recent years, there has been a rise in QR code scams and vulnerabilities in businesses, making it crucial for companies to understand the risks and take necessary precautions to protect themselves and their customers.

In this article, we will explore the use of QR codes by cybercriminals, the potential vulnerabilities they pose for businesses, and how companies can improve their QR code security.

0 Comments
Continue reading

What Really Happens When a Ransomware Attack Strikes?

What Really Happens When a Ransomware Attack Strikes?

Ransomware is perhaps the nastiest threat you can encounter, and the unprepared business could potentially be crippled beyond repair if it suffers from an attack like this. We’re here to demystify the inner machinations of a ransomware attack so you know better how to respond to it.

0 Comments
Continue reading

Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

For the most part, Microsoft takes security as seriously as it should, issuing updates and patches to maintain your Windows and Server operating systems. While you can count on receiving these updates for your supported operating systems, what you might not have known is that Microsoft accidentally overlooked a flaw in its own defenses.

0 Comments
Continue reading

These Are the Ways You Get Malware

These Are the Ways You Get Malware

Malware has been a problem for people that rely on technology for decades. Like the security that is designed to mitigate the effect of malware, the malware itself has grown in potency and frequency and is a major problem for businesses. Today, we will take a look at a few ways you can get malware. 

0 Comments
Continue reading

Ransomware Has Gone Mobile

Ransomware Has Gone Mobile

Smartphones have managed to hold out against ransomware a bit longer than other hardware and operating systems, but those days are coming to an end. It’s important to remember that the average smartphone is not protected with antivirus software and thus remains threatened by your standard ransomware attacks. It is absolutely critical that your business doubles down on its protection against ransomware, especially in the mobile market.

0 Comments
Continue reading

Top Cybersecurity Definitions that Maryland Businesses Need to Know

Top Cybersecurity Definitions that Maryland Businesses Need to Know

Cybersecurity needs to be taken seriously. Cyberthreats can cause serious damage to an organization in the form of lost revenue, lost data, damage to your public image, lawsuits, and more. It helps to understand what you are up against, so let’s define some of the most common types of threats that you need to be aware of.

0 Comments
Continue reading

Is Your Organization Putting Efforts into Preventing Cyberattacks?

cybersecurity

At the beginning of this year, Governor Larry Hogan approved $16 million in capital grants, distributed amongst 13 agreements. These grants were earmarked to benefit a variety of public facilities, from community centers to medical support and treatment centers, amongst others. 

While we recognize this as a great thing for the people of Maryland, we can’t help but hope that some of these funds are going to be used by the recipients to lock down their cybersecurity.

0 Comments
Continue reading

What Businesses Can Learn from the Maryland Department of Health Ransomware Attack

What Businesses Can Learn from the Maryland Department of Health Ransomware Attack

Back in December of 2021, the Maryland Department of Health suffered a ransomware attack that rendered quite a few services unavailable. Let’s take a few moments to look back at this attack to see what can be learned from it.

0 Comments
Continue reading

There is No Value in Paying a Ransom

There is No Value in Paying a Ransom

We all know at this point how dangerous ransomware can be for businesses. It can lock down files, threaten operational continuity, and in some cases subject victims to brutal fines as a result of privacy breaches. One place where you might not expect ransomware to hit, however, is customer reviews, and it all stems from the big question: do you pay to resolve a ransomware attack or not?

0 Comments
Continue reading

Malware is Everywhere. Even Your Ads

Malware is Everywhere. Even Your Ads

Do you ever see an advertisement for a free download of a popular Windows application and think, “Wow, this sure sounds too good to be true!”? Well, it most definitely is, and hackers use these malvertisements to infect computers with malware and other threats. Specifically, malvertising is used to download three different types of malware, all of which can cause harm to unwary businesses.

0 Comments
Continue reading

Let’s Look at Some of the Virtual Threats

Let’s Look at Some of the Virtual Threats

Network security is challenging for many businesses, and it’s largely because of the large number of various threats that populate the Internet. Some companies simply don’t know what the correct measures to take are, leaving themselves vulnerable to these threats on both a security standpoint and an employee training standpoint. We’ll delve into some of these threats and how they can be addressed.

0 Comments
Continue reading

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered.

The new updates were pushed out on Monday, September 13th, 2021, and include a major security fix for the Apple iPhone, Apple iPad, Apple Watch, and Apple Mac computers and laptops.

0 Comments
Continue reading

Read This if You Don’t Believe That Ransomware is a Major Problem for Businesses Like Yours

Read This if You Don’t Believe That Ransomware is a Major Problem for Businesses Like Yours

You’d think that cybercriminals would use ransomware to target high-profile businesses with loads of money to extort, but this is not always the case. Even a small business can fall victim to these particularly devastating threats. Ransomware, just like other threats out there, has continued to evolve and adjust its approaches based on the current cybersecurity climate, so what are some of the latest developments in ransomware?

0 Comments
Continue reading

Don’t Be Caught Off Guard by Ransomware

Don’t Be Caught Off Guard by Ransomware

Ransomware is bad stuff, and it’s only gotten worse with its recent resurgence that aligned with the COVID-19 pandemic. Phishing attacks and other means by which ransomware is commonly spread have used the current atmosphere as a springboard. This makes it even more critical that these kinds of behaviors and attempts can be spotted and stopped.

0 Comments
Continue reading

The Key to Protecting Your Business from Ransomware Is More of the Same

The Key to Protecting Your Business from Ransomware Is More of the Same

With so many high-profile ransomware attacks being launched against manufacturers, pipelines, and even hospitals, it’s no surprise that many companies are worried about what the future of this threat means for their organizations. Ransomware poses a serious threat, one that cannot possibly be ignored, so we urge you to take action now so you don’t come to regret it later.

0 Comments
Continue reading

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Network security isn’t just for large, high-profile enterprises; even small businesses need to take it seriously. All businesses have something of value to hackers, and if you don’t believe this is the case for your organization, think again. All data is valuable to hackers, and you need to do everything in your power to protect it—especially against threats like Agent Tesla, the latest version of phishing malware designed to steal your data.

0 Comments
Continue reading

Client Service Login

Latest News & Events

Columbia, MD - Dresner Group is proud to announce its sponsorship of the upcoming ABC Joint Tech Summit, a premier event hosted by the four local chapters of the Associated Builders and Contractors (ABC). The summit, spanning two days, will be held o...

Contact Us

Learn more about what Dresner Group can do for your business.

Copyright Dresner Group. All Rights Reserved.