Email

#
Back in January, Microsoft was alerted about new Exchange vulnerabilities being exploited by hackers. Within a few days, multiple bad actors started exploiting these vulnerabilities. Security researchers discovered tens of thousands of attacks targeting businesses, around the world, which are…
Read More >
#
Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. The new 'work from anywhere world' makes everyone at risk to cyber attacks, especially because threats are even harder to track…
Read More >
#
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
#
Remote workforces and sophisticated hackers change the risks businesses are facing. The COVID-19 pandemic has changed the ways businesses operate. It has also changed the potential security risks that hackers leverage to gain access to corporate data. People working from home and the use of…
Read More >
#
With over 94% of text messages read and over 45% responded to, it is no wonder why there has been an explosion of “Smishing” (just like e-mail phishing, but by text) in 2020. We have all gotten sick and tired of the daily spam and junk e-mail, so tools and our own common sense have us only…
Read More >
#
Four scams to avoid and some Fraud-stopping tips to review
Read More >
#
Not since Microsoft introduced its infamous ribbon in Office 2007, have we had so many complaints about the look and feel of Outlook, Word, Excel. Office 2019 and O365 present a cleaner desktop - less cluttered – whiter. Not everyone likes it. Microsoft presents a plethora of options to…
Read More >
#
Protecting business’ internet-connected systems from malicious outside activity is critical in today’s day and age of cybersecurity.
Read More >
#
When receiving login requests via email, it is always a best practice to verify in several ways.
Read More >
#
Cost effective and collaborative tools for businesses of any size. Collaborate with anyone, anywhere, on any device.
Read More >