Blog

News

Top Tips to Detect Phishing Scams

Sending emails plays a key role in a company’s business operations, with 86% of professionals preferring email as their primary means of business communication. Because they're so heavily relied upon, email accounts are common targets for cybercriminals. Using a method called phishing, these attacks are disguised as run-of-the-mill, regular emails,...

Read More...
News

Part IV: Next Generation Threats

Next Generation threats, by comparison, do not use conventional methods to reach your electronic assets.  They can disguise themselves as trusted traffic.  They can use legitimate programs – like Outlook or Adobe Acrobat – to run rules to manipulate data on the computer or server.  Next Generation threats can use...

Read More...
News

Part III: Conventional Threats

This is part III of our cyber security blog series. Here we cover what is considered a Conventional Threat. For decades, we've all become familiar with the ways we protect from viruses, spam, adware, trojans, and other malware we refer to as conventional threats.  Comparative to new threats like phishing...

Read More...
News

Part II: Scary Stats & Stories

Cybercrimes pose the greatest threat to companies around the world. Dark web cybercriminals target companies of all sizes in all industries at any given moment. Without warning, your data can be compromised and held hostage by despicable thieves. And it happens more than you may know.  In Part II of...

Read More...
News

Part I: The Teqworks Way

Most small businesses – 60%, reportedly – will not survive the year after experiencing a data breach, usually closing doors within 6 months.​ Every day, the IT environments of countless businesses and corporations around the world are under attack. Whether they know it or not, sinister entities are plotting heinous...

Read More...
Uncategorized

Remote Code Execution (RCE) Vulnerability CVE-2021-44228 

On Dec. 9, 2021, a remote code execution (RCE) vulnerability CVE-2021-44228 in Apache log4j 2 was identified and attackers are already actively exploiting this vulnerability. Since the advent of this issue, Teqworks has been consulting security partners and evaluating our and your systems for exposure to this vulnerability. Teqworks internal systems do...

Read More...
News

Teqworks Statement on Sunburst, SolarWinds, and FireEye Security Issue

On December 13, 2020, the US Cybersecurity and Infrastructure Security Agency alerted the general public of a known active exploitation of SolarWinds Orion and FireEye, software that is frequently used to support and monitor computer systems and networks.  This exploitation is currently referred to as Sunburst. Teqworks does not use...

Read More...
WHO MANAGES YOUR IT?
© 2023  TEQWORKS, INC.  |  All Rights Reserved  |  SITE BY CURTIS  |  An Argus Business Consulting Services, Inc. Company