Don’t Fall for Spoofing

When you receive a phone call, caller ID is supposed to tell you who’s on the other end. And yet, it can’t be trusted: While the caller might be based in the location they’re calling from, or might be the identity that appears on screen, they might also be lying, employing a malicious tactic known as spoofing. Don’t fall for …

Hackers Don’t Always Attack Your Business on the Internet

When we think of hackers, we think we of sophisticated actors across the internet—users who know how to code their way into malicious attacks to earn money. That is true, and it’s the basis for many attacks. However, sometimes, attacks start in the real world, and the best way to fight them off, is to simply be aware of your …

Protecting Your Business From Different Types of Phishing Attacks

A phishing attack is a general term for a type of cyberattack in which bad actors contact a large pool of people with malicious links or software hoping to trick some into clicking. The end goal, of course, is a payday. But not all phishing is the same: IT Governance has a list of the five most common types of …

Protecting Your Business from Cloud Security Breaches

Cloud-based solutions have never been more popular for small to medium-sized businesses, and it’s easy to see why. The convenience and potential offered by the cloud means businesses can operate and grow at a greater pace. However, just as it’s important to be vigilant from cyberattacks to your local network, you need to protect your business from cloud security breaches. …

Introducing MERIT Solutions’ Acceptable Use Policy Template

Merit Solutions now has a template of our Acceptable Use Policy (AUP) conveniently placed on our website for all customers to download and review for their employees. In this piece, we will walk through what an Acceptable Use Policy is, and why it is important for employees to review and sign one.

Your iPhone Passcode Isn’t Secure

If you have an iPhone, you likely unlock it with Face ID or Touch ID. However, after enough time, we all need to punch in our four or six-digit passcodes to gain access. As it turns out, that passcode is a key to just about everything on your iPhone, including your iCloud Account. Let’s explore the following scenario: You’re out …