Guidance and skill development on Method 10™ solutions from 1st Global consultants.

Posted in on

Prevention and Response to Email Scams

by Greg Wilson

Head of Information Security, 1st Global

With so much technology at our fingertips, allowing people to connect and communicate more quickly than ever before, it’s no surprise that some individuals have discovered ways to obtain unauthorized access to accounts and communications that aren’t their own. One area in particular in which this often occurs is through email messages. Attackers are able…

Read More

Posted in on

Social Engineering Attack Methods

by Greg Wilson

Head of Information Security, 1st Global

While computer system breaches are often done through means of technology, there are certain methods hackers can use to gather information through other forms of manipulation — especially social engineering. Social engineering is another way for hackers to take advantage of unsuspecting individuals. However, this method is less technical and, instead, uses human interactions and…

Read More

Posted in on

8 Signs Your Computer Has Been Hacked

by Greg Wilson

Head of Information Security, 1st Global

While the latest advancements in technology have made life more convenient for a vast majority of individuals in our society, they’ve also led to the increase of the abilities of hackers to compromise others’ computers, creating not only nuisances but also burdensome incidents of financial and identity thefts. Even with anti-virus software widely available, there…

Read More

Posted in on

Protecting Your Business When Employees Leave

by Greg Wilson

Head of Information Security, 1st Global

While it’s always important to take a variety of measures to ensure you are protecting your company from data breaches, this prevention becomes even more imperative when employees who were privy to secure information leave the company. In order to protect your business, your employees and your clients, appropriate precautions should be followed. The departures…

Read More

Posted in on

Doing Away with Debt

by Natalie Merrill

Senior Marketing Communications Writer, 1st Global

While it seems many of the individuals we encounter on a daily basis live fairly comfortable lives, there’s one burden a large number of Americans have that they don’t post about on Instagram, Snapchat or Facebook: debt. Whether it’s student loan, mortgage, credit card, automobile or another form of debt, the truth is that a…

Read More

Posted in on

Are Hackers Holding Your PC for Ransom?

by Greg Wilson

Head of Information Security, 1st Global

Individuals who seek to take advantage of others through the use of cyber-attacks often do so by means of ransomware, a type of malware that inhibits users from being able to access their data or use their computers unless they pay ransoms. The requested ransom amount and method may vary — it usually is requested…

Read More

Posted in on

Data Security While Traveling Internationally

by Greg Wilson

Head of Information Security, 1st Global

While technology provides many advantages to us in our daily lives, it can also be a source of risk to our personal information — especially while traveling internationally. Whether you’re traveling outside of the United States for business or pleasure, it’s important to remember to take precautionary measures to protect yourself from potential threats of…

Read More

Posted in on

Don’t Overlook the Importance of Password Protection

by Greg Wilson

Head of Information Security, 1st Global

Because of the growing concern of hacking and fraudulent schemes in the technology we use every day, the importance of password protection is something all businesses — and all individuals — should understand and apply. There are multiple tactics businesses can employ to help ensure login information and accounts are safe and help to avoid…

Read More

Posted in on

Protecting Your Business from Cybercrime

by Greg Wilson

Head of Information Security, 1st Global

Cybercrime has become a prevalent problem in society today with the advancement of technology and instantaneous access to so many different online outlets. It seems that almost no one is safe nowadays — somebody’s identity is stole every three seconds as a result of cybercrime, and it has even surpassed illegal drug trafficking as a…

Read More

Posted in on

Top 10 Ways to Avoid Becoming Phishing Bait

by Greg Wilson

Head of Information Security, 1st Global

A common issue that continues to grow as a problem in the technology world is phishing, which is a tactic used by cybercriminals to try to obtain financial or other confidential information from unsuspecting individuals. This is typically done through email messages or phone calls with the ultimate goal being to steal money from the…

Read More