HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.

Data Loss Can (and Will!) Affect Your Entire Business

Data loss, on any scale, is an organizational nightmare. Not only do you have to restore data, any lost productivity that comes as a result of the data loss incident makes it difficult on the budget. That’s only scratching of the surface of how serious data loss can be.

Continue reading
  0 Comments
0 Comments

Why (and How) SMBs Should Strategically Adopt Technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation and prioritize the solutions they need over the ones they want - building profitability and generating the capital needed to make other improvements.

Continue reading
  0 Comments
0 Comments

Have You Considered What You’re Really Losing When You Lose Your Phone?

Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot of personal information, which makes them extraordinarily dangerous to lose track of. How much is at stake with mobile devices going missing; and, what kind of information is stored on these devices that makes them so dangerous to misplace?

Continue reading
  0 Comments
0 Comments

When it Comes to Security, Two Factors are Better Than One

The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force their way into accounts by using software to rapidly guess thousands of passwords per second, making it extraordinarily difficult to prepare yourself for them. What’s the best way to guarantee that passwords aren’t going to be the downfall of your company? A great start is by taking a close look at password best practices and two-factor authentication.

Continue reading
  0 Comments
0 Comments

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.


First, it helps to understand why social media is such an attractive vector of attack for identity thieves. For one, the anonymity provided by the Internet has long been a staple reason why it’s been commonly used by hackers to steal sensitive information from organizations. This was (and still is) done through spam and scam emails, but nowadays, strategies have changed enough where individuals have to be more cognizant of their personally identifiable information because by using social media constructs like Facebook, Instagram, Twitter, and the like, they are much more exposed. Enterprise-level spam filters are readily available to all kinds of organizations, prompting hackers to step up their game and create new ways of stealing information.

Spear phishing tactics were the result of these efforts. Intending to bypass the likes of spam blockers and content filters through seemingly legitimate sources, phishing tactics come in a variety of forms, with the most successful of these coming from sources that hide the true intentions of the one making the attack. The Internet can mask the true identity of hackers so that they can seem to be someone else, either in an email scam, social media attack, or otherwise. This is known as spoofing and has been an infiltration tactic for decades.

In particular, social media can provide attackers with a lot of information without them working too hard. Think about the kind of information that you might have on your personal Facebook or Twitter feed. Do you have a phone number? What about an email address or physical address? Do you have any information about the musicians you listen to or the books that you enjoy? All of this information (and more) can be used to help a potential scammer steal your identity and use it for various ill offences - the gravest of which could be stealing your identity and using it to attack those you hold dear.

Imagine what could happen if someone were to steal the credentials to your social media pages and use them to impersonate you. They could fool all of your closest friends and family into giving up whatever information they are looking for. For example, they might be able to coax your parents or loved ones into parting with personally identifiable information such as your Social Security number or credit card number, which could be used to open new lines of credit or make fraudulent purchases. Regardless, the threat posed by identity theft through social media is considerable, and you must take precautions to ensure that you don’t fall for these traps in the future. Here are some ways that you can make sure this doesn’t happen.

Continue reading
  0 Comments
0 Comments

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

11 December 2019
Mobile devices haven’t been known to have a lot of faults when it comes to security, but when a really bad malware attack does happen, the best solution may be to wipe the device and start over from a factory reset. Currently, there is a malware targ...
10 December 2019
While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this...
05 December 2019
In days, Microsoft is pulling the plug on both Windows 7 and Windows Server 2008 R2. If your business still has to move away from this software, you need to act today. The consequences for not moving away from these titles can be absolutely dire for ...