Leone Technologies Blog

Leone Technologies has been serving the New Jersey area since 2003, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Three Cybersecurity Issues for Businesses to Prepare For

Three Cybersecurity Issues for Businesses to Prepare For

Running a business of any size comes with more than its fair share of risks, particularly if that business is on the smaller side. One major risk factor is the prospect of cybercrime and the impact it can have on a business. Let’s look at how this particular risk can influence the challenges that businesses must now contend with.

0 Comments
Continue reading

The Cybercrime the Small Business Needs to Plan For

The Cybercrime the Small Business Needs to Plan For

For the small, but growing business, there are a lot of risks that could potentially harm their ability to stay in business. One of those risks comes in the form of cybercrime. Over the past several years, small and medium-sized businesses (SMBs) have improved the ways in which they combat cybercrime. Let’s take a look at some of the problems SMBs have to deal with.

0 Comments
Continue reading

What You Need to Know About the Different Types of Phishing Attacks

What You Need to Know About the Different Types of Phishing Attacks

If there is one kind of online scam that people need to be more cognizant about, it would be phishing—where a scammer tries to hack the user instead of the computer, tricking them into sharing sensitive information. Phishing can come in enough forms that it has splintered into a few different varieties to watch out for. Let’s go over what a basic phishing attack looks like, some of the different types you may encounter, and how to deal with such an attack appropriately.

0 Comments
Continue reading

Mobile Smishing is Being Employed More Often

Mobile Smishing is Being Employed More Often

Cyberattacks continue to be a major problem as scammers send out billions of phishing messages a day. While it doesn’t really sound that nefarious it can be a major problem for a lot of people. One version of phishing, the absurdly labeled smishing, is gaining traction and presents another avenue of attack for hackers. 

0 Comments
Continue reading

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

Business success is often tied to the quality of your business relationships, and there are many people you need to trust: suppliers who can provide you with everything you need, the team who do their jobs, and customers who turn to you because they know they need you. Unfortunately, it is possible for cybercriminals to exploit this trust to achieve their own goals.

0 Comments
Continue reading

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.

0 Comments
Continue reading

Lessons to Learn from Attacks on COVID-19 Research

Lessons to Learn from Attacks on COVID-19 Research

With COVID-19 creating the challenges that it has for so many, there is little wonder that creating a vaccine is such a major focus. Unfortunately, hackers are aware of this focus, and how it makes the organizations conducting vaccine trials particularly vulnerable. Let’s examine this situation, and the lessons that all businesses can take away from it.

0 Comments
Continue reading

Are You and Your Team Prepared to Deal with Phishing?

Are You and Your Team Prepared to Deal with Phishing?

One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack.

0 Comments
Continue reading

Yeah, There’s a Reason Some Scams are So Obvious

Yeah, There’s a Reason Some Scams are So Obvious

We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.

0 Comments
Continue reading

Don’t Let Your Network Be Infected Thanks to Coronavirus

Don’t Let Your Network Be Infected Thanks to Coronavirus

Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do so, and how you can protect yourself and your business from these efforts.

0 Comments
Continue reading

Your End Users Are Your Last Line of Defense against Cybercriminals

Your End Users Are Your Last Line of Defense against Cybercriminals

Cybercrime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting trickier.

0 Comments
Continue reading

Phishing is a Major Threat

Phishing is a Major Threat

Fishing - a jerk on one end of a line waiting for a jerk on the other end.
Phishing - very similar to fishing, but much more consequential.

While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far from comical. Today we will discuss just how serious these attacks can be, and the easiest way to prevent them.

0 Comments
Continue reading

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

500 Million Users Exposed by Marriott

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five-year span.

0 Comments
Continue reading

Latest Blog

For companies that depend on their computing, the workstation plays an important role. The problem with them is that spending big money on computers that are used for general productivity is not cost effective, but if they don’t have the co...

Contact Us

Learn more about what Leone Technologies
can do for your business.

Leone Technologies
923 Haddonfield Road Suite #300
Cherry Hill, New Jersey 08002

Account Login