Arrowhead Technologies

Information Security

Phishing is the act of tricking someone into revealing their private or sensitive information. Common attacks attempt to convince you to install malicious software or hand over your personal information under false pretenses.

Gone Phishing: User Awareness and Training

A combination of technical controls and user awareness training can help keep phishing at bay. What Is Phishing? Phishing is the act of tricking someone into revealing their private or sensitive information. Common attacks attempt to convince you to install malicious software or hand over your personal information under false pretenses. How To Counter[…]

Read More »
two factor authentication example of single factor authentication password login screen

Turn on Two Factor Authentication!

Believe it or not, you’re most likely already using two factor authentication in your day-to-day life. Many (if not all) of us commonly use single factor authentication, such as using a password to log-on to a site. Two factor authentication (2FA) simply adds an extra step to your basic log-in[…]

Read More »
Protecting Your Identity on the Internet

Protecting Your Identity on the Internet

Protecting Your Identity on the Internet Because people use the Internet on a daily basis, they rely on it for a safe and accurate exchange of information. Personal data like Social Security numbers, credit card numbers, and passwords are traveling across the internet. But should it be trusted? Read on[…]

Read More »
social engineering photo with woman typing

Social Engineering, The Art of Hacking Humans

Social engineering is an attack that relies heavily on human interaction and often involves manipulating people to break normal security procedures. Usually, criminals are looking for your passwords, bank information or access your computer so that they can secretly install malicious software–giving them control over your computer. But why not[…]

Read More »
there are several things you can lower your changes of being a target. Here are our top 7 ways to avoid being hacked:

Top 7 Ways to Avoid Being Hacked

With all the recent news about government surveillance, corporate cybersecurity failures and large-scale hacks, keeping yourself completely safe online can seem like an impossible task. However, there are several things you can lower your changes of being a target. Here are our top 7 ways to avoid being hacked: Be[…]

Read More »
Lock with various network security words. Found in: 5 Ways to Secure Your Network Today! written by Arrowhead Technologies

5 Ways to Secure Your Network Today!

While Wi-Fi networks provide many benefits, an unprotected network can result in unauthorized use and potential harm unless certain steps are taken. For this reason, I have listed five ways that you can secure your network today: Use Encryption. Using encryption is the most effective way to secure your network[…]

Read More »
Why Do I need a Firewall

Why Do I Need a Firewall?

According to a study by NCSA Cyber Security, only 4% of Americans say they understand firewalls “completely”, while more than 44% don’t understand firewalls at all – or know if they have one enabled on their PC. If you’re part of the 96% of Americans that don’t quite understand what[…]

Read More »

Enterprise Antivirus

Today’s IT threats are more sophisticated than ever before, and with more and more consumer technology entering the enterprise, businesses are becoming more exposed. To reduce this exposure, it’s recommended that businesses enlist some form of Enterprise Antivirus that will allow the enterprise to identify, stop and prevent threats. According[…]

Read More »

What Are Hackers Looking For?

According to PacketWorks, most individuals or businesses don’t believe that hackers would “waste their time” trying to access their networks or computer. However, there are a great number of different “goods” on a computer that hacker can exploit for monetary or non-monetary gains. Read: What Computer Hackers Are Looking For[…]

Read More »

Intrusion Detection and Prevention

Today’s business entails a lot of information exchange, and technology plays a big role in keeping employees, customers, suppliers, and partners informed. However, with technology advancing, so are occurrences of security threats such as cyber threats, malware infections, phishing attacks, web application attacks, and so on. Some form of intrusion[…]

Read More »