Datapath Blog

Piggybacking - Courtesy That Could Cost You

Posted by Datapath on Jun 4, 2019 3:56:03 PM

To kids, piggybacking is when someone jumps on your back and you carry them around for a while. In the business world, piggybacking is when you let someone that you do not know enter a door that you just opened.

Read More

Topics: Security

Watch Out For Smishing!

Posted by Datapath on May 31, 2019 8:01:55 AM

What it is….

Read More

Topics: Security

"Google" Yourself

Posted by Datapath on May 30, 2019 1:46:13 PM

With the rise of the digital age, it is difficult (if not impossible) to remain totally anonymous on the internet. Having an online presence and maintaining your social networks can be a wonderful and valuable tool, but sometimes we are unaware of how much personal information can be obtained about us over time.

When was the last time you typed your name or your email address in a web search like Google or Bing? You may be shocked at the results. You may find that old photos of yourself pop up, or an old user account from a forgotten social network or blog that is still associated with your name. You may even want to search for your work email, to make sure it has not been compromised and made available on the internet for the bad guys to find.

By searching and analyzing your online presence often, you can take steps to remove those things you may not want strangers to see. Like that embarrassing photo from college. You know the one I’m talking about.

Read More

Topics: Security

Hovering Over Links

Posted by Datapath on May 29, 2019 2:28:32 PM

How can you tell if an email is safe? Even if you catch red flags in an email, such as typos or poor grammar, an urgent demeanor, or even a spoofed domain, how can you truly decipher the safety of an email?

Read More

Topics: Security

Company Size Doesn't Matter

Posted by Datapath on May 28, 2019 7:55:13 AM

Think hackers are only trying to target large corporations for their cyberattacks? Think again! If you are an employee of a small to medium size business, you may have an even bigger bullseye placed on you by hackers.

Read More

Topics: Security

Scam of the Week: Beware of Memorial Day Scams

Posted by Datapath on May 24, 2019 7:53:07 AM

The bad guys are known to use holidays to try to get you to click on a dangerous link or download a malicious attachment. Whether you're traveling this Memorial Day weekend, or staying home to take advantage of online shopping deals, be cautious when performing any types of online transactions. Be suspicious of any out-of-the-ordinary emails, and be mindful of what information you're sharing over your phone when you're on the road.

Read More

Topics: Security

Responsible Social Networking

Posted by Datapath on May 23, 2019 1:28:09 PM

Facebook, Twitter, LinkedIn
Chances are you are a member of one or more of these social networks.
Chances are you have posted something about work (positive and/or negative).
Chances are you have friends/followers/connections that are co-workers or your supervisor.

Read More

Topics: Security

That's Suspicious!

Posted by Datapath on May 20, 2019 8:52:55 AM

Have you ever encountered a situation at work that was suspicious? Perhaps this was a suspicious person, a suspicious email, or even a phone call that didn't seem right. Most organizations have a policy regarding how to handle these suspicious 'events'. These 'events' could potentially put the organization and/or the computer systems of the organization at risk. Some of the more common events are listed below:

Read More

Topics: Security

IRS and Tax Scams

Posted by Datapath on May 17, 2019 11:14:11 AM

Every year, the bad guys take advantage of innocent taxpayers, like you, who are patiently waiting on their tax return.

Read More

Topics: Security

Information Security Incident Reporting Policy

Posted by Datapath on Aug 29, 2017 9:05:37 AM

Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the steps they should take.

Read More

Topics: Tools & Templates