How to Recover from a Phishing Password Compromise
What is a Phishing Password Compromise?
A phishing password compromise occurs when an attacker tricks you into revealing your login credentials, such as your username and password, through a phishing attack. Once the attacker has your login credentials, they can access your account and steal sensitive information or use your account for malicious purposes.
Ways to Avoid Email Phishing Scams
What is Email Phishing?
Email phishing is a type of cyber attack where the attacker sends a fraudulent email to trick the recipient into revealing sensitive information, such as login credentials or financial information. Phishing emails can be very convincing and may appear to come from a legitimate source, such as a bank or a popular online service.
NSA Releases Best Practices For Securing Your Home Network > National Security Agency/Central Security Service > Article
FORT MEADE, Md. — The National Security Agency (NSA) released the “Best Practices for Securing Your Home Network” Cybersecurity Information Sheet (CSI) today to help teleworkers protect their home
Source: NSA Releases Best Practices For Securing Your Home Network > National Security Agency/Central Security Service > Article
Security Bulletin: NVIDIA GPU Display Driver – November 2022 | NVIDIA
Horde Webmail Changed to RoundCube Webmail on Plesk Hosting Servers
This post is only applicable to customers who have their domain’s email hosted on our Plesk hosting servers _AND_ (at least sometimes) access their email using the Horde webmail application. Note that most hosting customers use Outlook or Thunderbird to access their email, and do not regularly use webmail.
Two Factor Authentication is Available for Email
This is just a reminder that Two Factor Authentication (2FA) is available to protect widomaker.com personal email accounts, and Hosted Email Pro Enhanced Email accounts. Contact us if you need help enabling 2FA.
Netgear Router Vulnerabilities
Multiple Netgear router models contain vulnerabilities that a remote attacker can exploit to take control of an affected device. Widomaker does not provide Netgear routers with our service, however, many of our customers may have purchased one, themselves, to use with their Internet service. If you are using one of the affected Netgear models, you should update or replace the device, immediately. Please continue reading to determine if your Netgear router model is affected…
Increase in Emotet Malware Attacks via Email
This is just a quick note to remind customers to be vigilant when reading email.
In recent days there has been an increase in malware attacks by a family of malware, and cybercrime operation, known as Emotet.  The Cybersecurity and Infrastructure Security Agency (CISA) recently posted an update regarding Increased Emotet Malware Activity. 
Some main points, to be aware of, include…
FBI Releases Article on Defending Against Phishing and Spearphishing Attacks
In recognition of National Cybersecurity Awareness Month (NCSAM), the Federal Bureau of Investigation (FBI) has released an article to raise awareness of phishing and spearphishing. The article provides guidance on recognizing and avoiding these types of attacks.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users to review the FBI article and CISA’s Tip on Avoiding Social Engineering and Phishing Attacks. For more information on NCSAM, see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit. Users can report suspected attacks to their local FBI office or to the FBI’s Internet Crime Complaint Center at www.ic3.gov.
Small Business Cybersecurity Guide
The Australian Cyber Security Centre (ACSC) has released a cybersecurity guide for small businesses. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has redistributed the guide and encourages small business owners and administrators to review the guide, which provides checklists to help small businesses protect themselves against common cybersecurity incidents.
Would you like help completing the cybersecurity checklist for small businesses at the end of the guide? Contact Widomaker to set up a time we, or a local partner, can review the guide with you and determine how to implement the recommendations in your small business environment.
Click the button, below, to review the guide…