Arrowhead Technologies

Uncategorized

Phishing is the act of tricking someone into revealing their private or sensitive information. Common attacks attempt to convince you to install malicious software or hand over your personal information under false pretenses.

Gone Phishing: User Awareness and Training

A combination of technical controls and user awareness training can help keep phishing at bay. What Is Phishing? Phishing is the act of tricking someone into revealing their private or sensitive information. Common attacks attempt to convince you to install malicious software or hand over your personal information under false pretenses. How To Counter[…]

Read More »
two factor authentication example of single factor authentication password login screen

Turn on Two Factor Authentication!

Believe it or not, you’re most likely already using two factor authentication in your day-to-day life. Many (if not all) of us commonly use single factor authentication, such as using a password to log-on to a site. Two factor authentication (2FA) simply adds an extra step to your basic log-in[…]

Read More »
social engineering photo with woman typing

Social Engineering, The Art of Hacking Humans

Social engineering is an attack that relies heavily on human interaction and often involves manipulating people to break normal security procedures. Usually, criminals are looking for your passwords, bank information or access your computer so that they can secretly install malicious software–giving them control over your computer. But why not[…]

Read More »

Enterprise Antivirus

Today’s IT threats are more sophisticated than ever before, and with more and more consumer technology entering the enterprise, businesses are becoming more exposed. To reduce this exposure, it’s recommended that businesses enlist some form of Enterprise Antivirus that will allow the enterprise to identify, stop and prevent threats. According[…]

Read More »

What Are Hackers Looking For?

According to PacketWorks, most individuals or businesses don’t believe that hackers would “waste their time” trying to access their networks or computer. However, there are a great number of different “goods” on a computer that hacker can exploit for monetary or non-monetary gains. Read: What Computer Hackers Are Looking For[…]

Read More »