Recently, malware researchers discovered a trojan app on the Google Play Store. Trojans are apps or software that appear legitimate but are actually malicious. Thousands of users downloaded this app…
Author: Editor
Citynet Fiber: Increasing the Value of Your Home!
It’s true! Having gigabit-fiber internet at your home can positively impact the value of your home. A study by the University of Chicago and Carnegie Mellon University* found that…
The NIST Cybersecurity Framework: A Guide for Businesses
Download the NIST Data Sheet The NIST Cybersecurity Framework (CSF) is a set of guidelines for mitigating organizational cybersecurity risks. It is a voluntary framework that can be used by…
5 Must-Know SIEM Questions Answered
Download our SIEM FAQs 1. What Does SIEM Stand for? SIEM = Security Information and Event Management 2. What is CyberPulse? CyberPulse is Citynet’s SIEM solution: a 24/7/365 intelligent threat…
PayPal Payment Ploy
Recently, cybercriminals have taken advantage of PayPal, the popular international online payment platform. Cybercriminals are spoofing PayPal in order to try and steal your personal or financial information.In this scam,…
How Does a SIEM like CyberPulse Actually Work?
CyberPulse is Citynet’s SIEM (Security Information and Event Management) security solution that collects, aggregates, and analyzes security logs and events across an organization’s IT infrastructure. This data can be used…
Just what is a `SIEM?
SIEM stands for Security Incident and Event Management. Citynet’s CyberPulse is our SIEM solution that helps organizations collect, analyze, and respond to security events. CyberPulse collects comprehensive data from network…
Social Engineering Red Flags #3: Date/Subject Line
The prevalence of phishing scams is at an all-time high. With you being the key to preventing a cyber attack within your organization, it is important to question the legitimacy…
Smishing for Bank Information
Recently, a ring of cybercriminals used a smishing attack in order to steal credit card information. A smishing attack is a type of phishing attack through SMS messaging. The cybercriminals…
How to Handle Suspicious Emails
Learning how to handle suspicious emails is essential to keep your organization safe from cybercriminals. If you don’t correctly handle a suspicious email, you could fall victim to a phishing…