Skip to content
  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

O'Mard Consulting Services, LLC

Plan, Execute, Win, Repeat!

Category: Threat Report

5 Simple Steps to Stay Safe Online While Traveling!

Posted on May 3, 2021May 6, 2021 by Jeremy

KEY POINTS Cybersecurity experts agree that travel can introduces you to additional information security risk. A 2019 IBM Security study… Read more 5 Simple Steps to Stay Safe Online While Traveling!

Another Facebook Data Breach? Here’s What You Need to Know!

Posted on April 12, 2021April 11, 2021 by Jeremy

KEY POINTS In 2019, Cyber criminals exploited a vulnerability associated with Facebook’s import contact feature, which is used to find… Read more Another Facebook Data Breach? Here’s What You Need to Know!

3 Types of Scams You Are Likely to See This Holiday Season and How to Avoid Them!

Posted on November 30, 2020December 2, 2020 by Jeremy

KEY POINTS As documented in its 2019 Internet Crime Report, the FBI’s Internet Crime Complaint Center (IC3) received 467,361 complaints… Read more 3 Types of Scams You Are Likely to See This Holiday Season and How to Avoid Them!

Fear, Uncertainty, and Doubt – Combating Disinformation in the midst of an Election

Posted on October 13, 2020October 10, 2020 by Jeremy

KEY POINTS A 2016 study by the Pew Research Center identified that 64% of American adults believe that fake news… Read more Fear, Uncertainty, and Doubt – Combating Disinformation in the midst of an Election

How Does One Find out If a Cyber Attack Is a State-sponsored or a Private Attempt?

Posted on September 8, 2020September 7, 2020 by Jeremy

KEY POINTS Cyberspace is widely considered to be the fifth domain of modern warfare, which also includes space, air, ground,… Read more How Does One Find out If a Cyber Attack Is a State-sponsored or a Private Attempt?

3 Ways to Spot a Bot on Social Media

Posted on August 10, 2020August 9, 2020 by Jeremy

KEY POINTS A 2016 study by Incapsula revealed that 51.8% of all internet users were actual robots! Bots can typically… Read more 3 Ways to Spot a Bot on Social Media

Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Posted on June 22, 2020December 23, 2020 by Jeremy

KEY POINTS Cyber Criminals have mastered the art of weaponizing popular culture to launch cyber attacks. Phishing email campaigns are… Read more Malicious Cyber Actors Leverage Black Lives Matter Movement to Distribute Trickbot Malware

Hackers Targeting Mobile Banking Apps – What You Need to Know!

Posted on June 15, 2020January 6, 2021 by Jeremy

KEY POINTS According to the FBI, the use of mobile banking apps has increased by 50% since the beginning of… Read more Hackers Targeting Mobile Banking Apps – What You Need to Know!

How To Avoid Being Zoom Bombed In 5 Easy Steps!

Posted on April 6, 2020April 5, 2020 by Jeremy

KEY POINTS The Zoom maximum number of daily meeting participants increased from 10 million in December 2019 to 200 million… Read more How To Avoid Being Zoom Bombed In 5 Easy Steps!

Is The IRS Really Calling Me?

Posted on March 17, 2020March 15, 2020 by Jeremy

Most if not all of us have received a call from the “IRS/Social Security Administration/Insert your countries government agency that… Read more Is The IRS Really Calling Me?

Posts navigation

Older posts

Recent Posts

  • What Are Some Common Security Vulnerabilities in Web Applications, and How Can I Prevent Them?
  • Do Routers with Built-in Firewalls Provide More Security than Those Without Them?
  • What Is a Web Application Firewall and What Are Its Benefits?
  • Data Privacy Week 2023 Starts Now! How to Take Back Control of your Data.
  • Cybersecurity at Home – 3 Simple Steps You Can Take to Secure Your Home!

Site Map

  • About us
  • Services
  • Consultations
  • Privacy Policy
  • Contact Us

Archives

Categories

Socialize With Us!

Socialize With Us!
Proudly powered by WordPress | Theme: Argent by Automattic.
We utilize third party advertisements to support our site. By using our site you agree to our privacy policy.OkNoPrivacy policy