The Hidden Dangers of Trade Show USBs

The Hidden Dangers of Trade Show USBs

Author: David Laster – Director of Software Solutions at GraVoc Picture this: You just got back to the office from a networking event or conference where you received several promotional USB drives from different companies. Thinking nothing of it, you plug one...
IRS Issues Warning Against Unusual Phishing Scheme

IRS Issues Warning Against Unusual Phishing Scheme

The Internal Revenue Service is warning taxpayers of an unusual phishing scheme that is going around this tax season. Using stolen data obtained by tax professionals, criminals are filing fraudulent tax returns and depositing them into actual taxpayers’ bank...
SEC Updates Cybersecurity Guidance

SEC Updates Cybersecurity Guidance

The United States Securities and Exchange Commission (SEC) has revised and released cybersecurity guidance for publicly traded companies. The goal of the revised guidance is to assist public companies in preparing for and responding to cybersecurity risks and...
GraVoc presents KnowBe4: Building the Human Firewall

GraVoc presents KnowBe4: Building the Human Firewall

Date: February 7, 2018 Time: 11:00am-11:30am Have your employees been properly trained to adhere to information security best practices? A large challenge that many businesses face is the ability to properly protect confidential information within your organization....
All Hands on Deck at BankWorld 2018

All Hands on Deck at BankWorld 2018

The GraVoc team was all hands on deck at this year’s BankWorld, hosted by The Warren Group and Connecticut Bankers Association! The event took place at Mohegan Sun on January 12th, 2018. Along with being a Gold sponsor for the event, our Information Security...
Emerging Threat: Crypto-Currency Mining Malware

Emerging Threat: Crypto-Currency Mining Malware

With the continued rise of crypto-currencies, both in value (one bitcoin is currently valued at $11,300.00) and mainstream acceptance, it is no surprise that hackers have developed exploits to benefit from this boom.  Specifically, security researchers have identified...
Beware of Apple’s MacOS High Sierra Root Access Bug

Beware of Apple’s MacOS High Sierra Root Access Bug

Who still thinks Apple products can’t get hacked? You may have heard about this common misconception and Apple is happy to let you believe it. For example, Apple advertises their new macOS High Sierra as having “an advanced architecture that brings a new level of...
How Compromised Accounts Get Compromised

How Compromised Accounts Get Compromised

If you have ever had your identity stolen or an online account compromised, you may have asked yourself how the theft of your information or credentials occurred. Recently, Google and UC Berkley conducted a study regarding the common ways in which someone’s account...

Pin It on Pinterest