Protecting Your Business From Different Types of Phishing Attacks

A phishing attack is a general term for a type of cyberattack in which bad actors contact a large pool of people with malicious links or software hoping to trick some into clicking. The end goal, of course, is a payday. But not all phishing is the same: IT Governance has a list of the five most common types of …

Protecting Your Business from Cloud Security Breaches

Cloud-based solutions have never been more popular for small to medium-sized businesses, and it’s easy to see why. The convenience and potential offered by the cloud means businesses can operate and grow at a greater pace. However, just as it’s important to be vigilant from cyberattacks to your local network, you need to protect your business from cloud security breaches. …

Introducing MERIT Solutions’ Acceptable Use Policy Template

Merit Solutions now has a template of our Acceptable Use Policy (AUP) conveniently placed on our website for all customers to download and review for their employees. In this piece, we will walk through what an Acceptable Use Policy is, and why it is important for employees to review and sign one.

Your iPhone Passcode Isn’t Secure

If you have an iPhone, you likely unlock it with Face ID or Touch ID. However, after enough time, we all need to punch in our four or six-digit passcodes to gain access. As it turns out, that passcode is a key to just about everything on your iPhone, including your iCloud Account. Let’s explore the following scenario: You’re out …

Any MFA Is Better Than No MFA

It is difficult to emphasize enough the importance of multi-factor authentication (or MFA). It isn’t enough to protect your account with a password alone. You need a secondary security solution that ensures bad actors can’t break into your account if your password leaks. While there are a few different types of MFA to choose from, with varying levels of security, …

Don’t Fall for This Instagram Scam

Popular social media apps like Instagram have billions of users. It’s a staggering amount of people, but to hackers, it’s an opportunity. While scams on Instagram aren’t new, there is an emerging scheme that is dangerous, since it plays off of a real Instagram feature. A new Instagram scam (or Instascam) has started to hit user’s direct messages. Here’s how …