Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

Cybersecurity Month is Over, Time to Get Sloppy!

Cybersecurity Month is Over, Time to Get Sloppy!

Are you tired of hearing about the importance of secure passwords, two-factor authentication, and security updates?

We get it. All of these techno-nerds (ourselves included) have spent all of October and even the weeks leading up to it talking about the importance of cybersecurity, preaching the importance of things that, let’s face it, just get in the way of you getting work done. Thank goodness Cybersecurity Month is long over, and now we can all get back to being absolutely reckless with our data, right?

0 Comments
Continue reading

How to Protect Yourself from the Four Major Types of Cybercrime in Baltimore

How to Protect Yourself from the Four Major Types of Cybercrime in Baltimore

It’s easy to focus on WHAT people should be doing to prevent themselves from becoming victims of cybercrime, but it’s just as easy to ignore the advice from experts while thinking “nah, that won’t really affect me.”

The thing is, you HAVE to be aware of these threats, and you have to take measures to protect yourself. We’re going to drop the dramatic language here, and focus on breaking the threats down so it’s easier to be more aware of them, and hopefully make it easier to navigate and circumvent a world that has a growing amount of cyber threats.

0 Comments
Continue reading

A Few Useful Insights into Online Payment Fraud

A Few Useful Insights into Online Payment Fraud

Financially-focused cyberthreats are no joke, especially considering how digital payments now make up 41.8% of all payments made worldwide. Let’s consider a few statistics that highlight how important it is to ensure that the payment card data your business collects is sufficiently protected.

0 Comments
Continue reading

Hackers Circumvent Traditional Cybersecurity with Phishing

Hackers Circumvent Traditional Cybersecurity with Phishing

Business owners often get unsolicited emails from individuals who want to sell them goods, services, or products. Depending on the message, they might even come across as a bit suspicious, prompting you to question the authenticity of the email. If you’re not careful, you might accidentally expose your organization by clicking on the wrong link in the wrong email, thus falling victim to the oldest trick in the book: the phishing attack.

0 Comments
Continue reading

ALERT: Cybercriminals are Targeting Baltimore Businesses

ALERT: Cybercriminals are Targeting Baltimore Businesses

The greater Baltimore area is no stranger to cyberattacks, but recent trends are pointing to an increased rise in attacks targeting businesses throughout the area. Let’s take a look at what businesses and other organizations have been experiencing.

0 Comments
Continue reading

We Think You Should Know What Social Engineering Is

We Think You Should Know What Social Engineering Is

Social engineering is a dangerous threat that could derail even the most prepared business. Even if you implement the best security solutions on the market, they mean nothing if a cybercriminal tricks you into acting impulsively. Let’s go over specific methods of social engineering that hackers might use to trick you.

0 Comments
Continue reading

Baltimore Businesses Need Security Awareness Training in 2022

security_training

Cybersecurity is an important consideration for all businesses—including the over 13,000 private businesses and 420 government establishments that were operating in Baltimore City as of 2020. This has unfortunately been reinforced a few times in the recent past, with many businesses having been the victims of rampant cyberthreats. Let’s review what some of these events have been, and what modern organizations should be teaching their employees to help avoid these issues.

0 Comments
Continue reading

How to Know You’re Being Targeted by a Phishing Attack

phishing_attack

Phishing attacks are serious business, so it is important that your team members know what they are, for one, and know how to spot them. To facilitate this, let’s review the signs of a phishing attack—or ideally, a phishing attempt (because by spotting it, you’re more able to stop it).

0 Comments
Continue reading

Social Media Conditions People to Let Their Guard Down

Social Media Conditions People to Let Their Guard Down

How often do you check social media only to find your news feed clogged with your friends and family sharing the results of quizzes like, “Which Star Wars character are you,” or “What’s your superhero name based on your birthday.” While these quizzes might seem harmless on the surface, they often hide a far more sinister agenda, one which uses the personally identifiable information provided to them for nefarious purposes.

0 Comments
Continue reading

The Dangers of Near-Constant Phishing Attacks

The Dangers of Near-Constant Phishing Attacks

For twenty years, hackers have tried to breach organizational networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The problem was that as soon as something was able to get through the outer defenses, there was no end to the devastation a hacker could cause inside a network.

0 Comments
Continue reading

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Network security isn’t just for large, high-profile enterprises; even small businesses need to take it seriously. All businesses have something of value to hackers, and if you don’t believe this is the case for your organization, think again. All data is valuable to hackers, and you need to do everything in your power to protect it—especially against threats like Agent Tesla, the latest version of phishing malware designed to steal your data.

0 Comments
Continue reading

The Colonial Pipeline Attack Continues to Be Important to Cybersecurity

The Colonial Pipeline Attack Continues to Be Important to Cybersecurity

The situation surrounding the hack against Colonial Pipeline has only become more complex as new information has come to light, each new discovery providing more insights and potentially actionable takeaways. Let’s examine some of the biggest developments surrounding the attack, and what they will likely mean for overall cybersecurity from this point forward.

0 Comments
Continue reading

Even Small Businesses Should Consider Physical Security Keys

Even Small Businesses Should Consider Physical Security Keys

With new crisis-level cybersecurity events making headlines, it’s easy to assume that smaller businesses aren’t at the same risk level as larger enterprises. However, most common attacks don’t care who gets hit. There is also plenty of evidence pointing out that smaller businesses are at an even higher risk—you just don’t hear about them on the news.

0 Comments
Continue reading

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

0 Comments
Continue reading

You Even Need To Worry About Phishing In Your Text Messages

You Even Need To Worry About Phishing In Your Text Messages

As serious as they are, cyberattacks are not always labeled with the most serious-sounding names. We are, of course, talking about phishing: the use of spoofed email addresses and fraudulent messages to get hold of data, or whatever goal the attacker has in mind. One of the silliest-sounding versions of phishing—smishing—has proven to be of particular risk.

0 Comments
Continue reading

Scammers are Phishing for Dollars

Scammers are Phishing for Dollars

When people talk about cybersecurity nowadays, there certainly seems to be a lot of emphasis put on phishing attacks and ransomware. This is for good reason. Not only can either of these attack vectors create significant difficulties for a business, they are often used in tandem. Let’s discuss why these threats are so potent, and why they so often show up together.

0 Comments
Continue reading

Maryland’s Top 3 Cybersecurity Misconceptions

Maryland’s Top 3 Cybersecurity Misconceptions

With everything else going on, it’s easy to let your guard down. Business owners have more to worry about than ever before—the health and safety of their staff and customers, making payroll, keeping the lights on. Granted, some businesses have it harder than others, but the general consensus right now is that things are less stable than they were.

0 Comments
Continue reading

Three Must-Have Critical Security Training Tips Your Remote Team Needs

Three Must-Have Critical Security Training Tips Your Remote Team Needs

Remote work is here to stay, and now is the time to ensure your team has the skills and knowledge to keep themselves and your client data safe. Here are three training areas your business should focus on to help keep your data safe and secure.

0 Comments
Continue reading

Can the Members of Your Team Recognize a Phishing Attempt?

Can the Members of Your Team Recognize a Phishing Attempt?

Want to find out?

Phishing is a serious issue for businesses of all sizes, mainly because it’s a relatively easy way for cybercriminals to take advantage of the easiest part of the business to fool: the end user. You need to know that the members of your team would be able to spot a phishing attack and handle it appropriately.

0 Comments
Continue reading

COVID-19 Vaccine Attacks Teach an Important Cybersecurity Lesson

COVID-19 Vaccine Attacks Teach an Important Cybersecurity Lesson

Since the outbreak of the COVID-19 coronavirus has wreaked havoc across the globe, there has been a lot of hope and effort put towards developing a vaccine against it. Unfortunately, just as some experiments have produced promising results, hackers have begun targeting the research centers responsible. Let’s look at this situation to see what it can teach us.

0 Comments
Continue reading

Client Service Login

Latest News & Events

This tournament is scheduled to be held Friday, June 10, 2022. The past six years have all been sold-out and this year is shaping up to be another one for the books you won't want to miss. 

Contact Us

Learn more about what Dresner Group can do for your business.

  • (410) 531-6727
  • 8600 Foundry Street, Suite 302, Savage, Maryland 20763

Copyright Dresner Group. All Rights Reserved.