Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

20Aug2019

Email in Disguise

The trend of getting voicemail messages through email is opening new doors for hackers to enter computer systems. Scammers are using email with spoofed addresses to hack into business operations, such as wiring money. Today’s office environment provides a perfect setup for a hacker: You hit people when they’re juggling multiple tasks, and you come
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, data security, email hacked, privacy, security, spam, spoofing, voicemail,
Read more
11Sep2018

Password Agony; No Ecstasy

Passwords are a total pain. Upper- and lower-case letters, numbers and special characters in one password are likely unbreakable over the course of a lifetime. But just to be safe, you’re required to change them periodically – without repeating one you’ve previously used for a website. And if you go to extremes, well, it is
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security, spoofing, strong passwords,
Read more
08May2018

Who Really Sent That Email?

We’re seeing a pattern in security problems caused by “fake emails.” Although the pattern is not restricted to business emails, they seem to show up more frequently in offices. Here’s what’s happening. Just like good marketers, email spoofers and hackers have noticed that Wednesdays and Thursdays are “light days” for email traffic. If someone who’s
  • 8 May, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, Malware, online safety, risk management, spoofing,
Read more
10Apr2018

Spoofs and Email Management

Spoofing email addresses is so common that you might as well accept the fact that you have to scrutinize every message you get. With our switch to a new Office 365 management portal, many clients have been getting emails allegedly from Microsoft, and some are more obvious spoofs than others. It might be time to
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, spoofing,
Read more
13Mar2018

Safe Travels, Safe Wi-Fi

It’s getting near spring-break time, and summer vacations will soon follow. You may have seen the reports about wi-fi issues and data security. One of the biggest problems you face is how easy it is to log onto a “fake” wi-fi network – a network that is neither part or your hotel’s system nor secure.
  • 13 Mar, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime. cybersecurity, data security, online safety, public wifi, spoofing,
Read more
13Mar2018

Fraud’s Warning Signs

Anyone who tries to defraud you online – or even on the telephone – is literally banking your carelessness. Take a good look at emails and links and listen carefully on the phone. You can spot the fraud, and if you’re not sure, disengage and call the person you think contacted you – on the
  • 13 Mar, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, fraud, online safety, phishing, risk management, security, spamming, spoofing,
Read more
13Feb2018

Tax Season: The Next Scam Season

I don’t know whether more money changes hands during the holiday shopping season or during tax season, but a lot is at stake between now and April 17 as people prepare tax returns. It’s a busy time of year for scammers, most of whom want to use fraudulent information to get your tax return money.
  • 13 Feb, 2018
  • Norman Rosenthal
  • 0 Comments
  • back taxes, chbersecurity, cybercrime, data breach, data security, email scams, equifax, fraud, irs, online security, phishing, phone scam, risk management, scams, spoofing, strong passwords, tax season,
Read more
14Mar2017

Nomorobo = No More Robo Calls? We Hope It Adds Up

If you’re tired of robo calls and caught in the web of spoofed telephone numbers, Nomorobo might be the app for you. It is for us. It’s one product to help you manage your telephone. For most of us, robocalls are a major annoyance. Even when you don’t pick up the phone, they ring and
  • 14 Mar, 2017
  • Norman Rosenthal
  • 2 Comments
  • Android, CTIA, FCC, IOS, iPhone, robo calls, security, spoofing,
Read more
10Jan2017

Don’t Wait When Hacked

A client got hacked at 5 p.m. and discovered it at 8 p.m. They waited until the next morning to call us. Our advice to them was to shut down their system. Our advice to you is don’t wait – but please use some common sense. We don’t appreciate calls at 5:30 in the morning
  • 10 Jan, 2017
  • Norman Rosenthal
  • 0 Comments
  • compromised, data security, hacked, Malware, online safety, privacy, risk management, spoofing, trojan,
Read more
11Oct2016

Following the Money Conversations

Money is the only reason somebody steals information. Some 70 percent of the emails that lead to information theft are related to either financial institutions, businesses or something that mentions money in the subject line. Another 20 percent are related to espionage, and 5 percent are related to employee grudges. In most cases, curiosity kills
  • 11 Oct, 2016
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, data security, hack, identitiy theft, information theft, money, phishing, scam, security, spam, spoofing, strong passwords,
Read more
Older Posts >>