From our colleagues at Webroot, here's a summary of the nastiest malware of the year. As you might expect, COVID-19 related attacks were on the rise. Ransomware continues to dominate, as measured by the amount of devastation that malware in this category caused. The...
Cybersecurity
Geek Girls IT Services Blog
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.
COVID-19 Phishing Scams: Be Aware
This infographic can help make users more aware of COVID-19 related phishing scams. You may want to share this post with your employees and colleagues.
Important Video: 1 out of 3 Employees Clicked on a Phishing Email in the Last Year
This video explains the dangers of phishing and how important it is to train and educate your employees about cyber security. Watch the video.
From Our Friends at Rue: 3 Common Phishing Attacks and How to Avoid Them
This downloadable PDF discusses three types of phishing schemes, and what to watch out for: spear-phishing deceptive phishing whale phishing A phishing attack involves hackers using spam email or other forms of communication to trick the victim into providing...
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
Your Healthcare Practice in a “Work From Home” World
From our friends at RingCentral comes this valuable resource on how to run a remote-friendly healthcare practice: https://www.ringcentral.com/how-to-run-healthcare-practice/how-to-start-healthcare-business/ Cyber security is a critical component of remote healthcare...
How Our Customers and Others Secure Their Remote Workforces
From our friends at Duo: How do you enable an increasingly remote workforce with confidence when hacking attempts against "work from home" users are at an all-time high? Duo’s security solutions complement any technical environment, and are engineered to verify...
From Nextgov: Those Facebook ‘Challenges’ Can Expose You to Hackers
The isolation and routine of WFH is starting to get to you, so you take a break to play a game or check your feed on Facebook. Be careful! Oversharing of sensitive information or giving games access to your profile can lead to security breaches. Source: Those Facebook...
A New Layer of Cyber Security for our Managed Services Clients: Webroot Evasion Shield
The Webroot Evasion Shield is a new part of Webroot Business Endpoint Protection. It blocks malicious scripts from running, protecting your computers from ransomware and other malware that can be used to launch attacks on your network. If you are a Geek Girls IT...

From Krebs on Security: Turn on MFA Before Crooks Do It For You
If your account is hacked and you have not enabled 2-factor authentication, the hacker could enable it and tie the account to a device they control, making it even more difficult for you to recover access to your account. So it's important to set up 2FA before you get...