Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Hybrid Work is Here to Stay, But Only If Businesses Keep Security in Mind

The COVID pandemic forced businesses all over the world to adopt remote work practices, whether they were ready for them or not, and it wound up establishing full-fledged remote and hybrid positions which may never have existed otherwise. However, with these new developments come new threats, and you need to be ready to handle them as they crop up.

0 Comments
Continue reading

What is the Difference Between a Security Breach and a Data Breach?

In our blog, we talk about security and data breaches all the time. We tell you how you can take efforts to avoid them and how to prepare your organization for the inevitability of being exposed to them. With all that security talk, we should briefly describe the difference between a security breach and a data breach, because they are two different things that get lumped together quite a bit.

0 Comments
Continue reading

What Twitter’s API Breaches Mean for Cybersecurity Trends

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be done to stop them.

0 Comments
Continue reading

The Vatican Proves that No One is Immune to Cyberattacks

While it may not be the first target one might think of when it comes to cyberattacks, a recent Distributed Denial of Service (DDoS) attack on the Vatican’s official website only proves that cyberattacks can potentially influence any organization. Let’s consider the situation, as well as what lessons we can all take away from it.

0 Comments
Continue reading

What Exactly is a Zero-Day Exploit?

There are countless known threats out there that create security headaches for network administrators, but it’s not the known flaws that are the most dangerous; it’s the unknown ones that have even more potential to derail operations, expose sensitive data in security breaches, and end businesses entirely. These zero-day flaws or exploits are extremely important to keep informed about.

0 Comments
Continue reading

Mobile Malware is a Guaranteed Bad Time

More often than not, the malware you encounter will target a desktop computer. Despite this, there are indeed some threats that target mobile devices, including one which Google had to remove from the Play Store for infecting smartphones with malware and adware. We recommend that you take immediate action to uninstall these apps if you were one of the unfortunate folks who accidentally installed them.

0 Comments
Continue reading

Here’s Why You Are Paying So Much for Data Privacy

We know that security is far from a small investment, but this only serves to highlight how important it can be to your business’ continued success. You might wonder why security is such an important investment if you don’t intend to suffer a data breach, and that’s precisely the point. The cost of not investing in security far outweighs the initial investment.

0 Comments
Continue reading

Why You Shouldn’t Follow Links You Randomly Receive

Paypal: Unusual activity suspended your account. For your safety confirm your identity here: [link]

We’re here to tell you, very simply, not to follow links that are in messages like these, and to instead confirm their legitimacy by navigating to the website directly in a new browser.

0 Comments
Continue reading

What Counts as Personally Identifiable Information?

We frequently discuss the importance of keeping PII—personally identifiable information—secure, but what does this include? What data qualifies as PII?

Here, we’re going to lock down on a definition (and you may be surprised by what this definition covers).

0 Comments
Continue reading

The Phisher—A Modern Take on The Raven

What if Edgar Allan Poe wrote “The Raven” during the information age?

0 Comments
Continue reading

Why BEC is Such a Negative Circumstance for Any Organization

It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it.

0 Comments
Continue reading

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft generally takes security very seriously, and for the most part, if you keep your Windows and Server operating systems updated, you can generally depend on some base-level security and stability. Unfortunately, it was recently discovered that, for almost two years, a very critical defense mechanism within Windows wasn’t being properly secured.

0 Comments
Continue reading

Don’t Give Up on Password Managers, Even Though LastPass was Breached

In August, LastPass suffered a data breach that allowed hackers to access the LastPass source code. Let’s take a look at this situation and see what you need to do to maintain proper password security moving forward.

0 Comments
Continue reading

This Ransomware Group’s Antics Remind Us How Dangerous Ransomware Can Be

Just like any other business that takes some time to get to know a new client, a new type of ransomware can take up to two weeks to map a network before it goes in for the kill. This threat from a group called Zeppelin has the potential to be a major threat actor in the ransomware space.

0 Comments
Continue reading

Security that’s So Simple, It’s Smart

Cybersecurity, to many, can sound inherently complicated—complicated enough, perhaps, that many may elect to put it off for as long as they can, or even choose to go without it. Even without our obvious bias factoring into our considerations, this is a bad idea. Let’s go over some basic security practices that are simple to enact, but can easily make a world of difference for your security.

0 Comments
Continue reading

MFA Could be Improved Upon With Adaptive Authentication

We’d be the first to admit that, as much as we’d recommend that you use multi-factor authentication wherever it is available, MFA isn’t perfect. This makes the idea that an improvement to these methods is on the horizon an intriguing one. Let’s discuss what may become the new and improved standard fairly soon.

0 Comments
Continue reading

Have You Been Breached? Here’s How to Find Out

Did you know that you could be the victim of a data breach without even knowing it? It’s possible, really. If a hacker has managed to infiltrate a website or service that you use without giving up the goat, so to speak, they could have your information and you might not even know about it. Thankfully, there are ways around this, and it all starts by asking that simple question: what if my information was stolen, and what is it being used for?

0 Comments
Continue reading

All You Need to Know About the Raspberry Robin Worm

Using USB drives to spread threats is certainly not a novel concept, and you should always be wary of potential threats using USB drives to make their rounds. In particular, a new and emerging threat called the Raspberry Robin worm could shake things up in the world of cybersecurity. What is this threat, and how can you keep yourself and your business safe from its attacks?

0 Comments
Continue reading

Cybercrime Turning Up the Heat on Those that Provide Degrees

Ransomware is never a good thing, but for some, it can be worse than it is for others. Take educational institutions, for instance—they’ve become a favorite target for cybercriminals to take advantage of, unfortunately successfully. Many resort to paying up, something that we’d never recommend.

0 Comments
Continue reading

As Business Risks Change, So Too Must Our Cybersecurity

As the technology we use in business and in life has advanced, the threats that target it have done the same and then some. Let’s take a few minutes to discuss these threats and what you need to do to protect yourself.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code