(978) 546-3571

Slingshot Information Systems, Inc. Business Technical Support Services
  • Home

  • About

    • Client Testimonials
    • Contact
    • Privacy Policy
  • Blog

  • Services

    • Cloud Computing Services
    • Help Desk Services
    • Network Security
    • Remote Monitoring & Management
  • Knowledgebase

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • Operating Systems
    • IT Security
    • Tips and Advice
    • Phishing
    Search
    Ransomware Primer
    Stan Patey
    • Sep 19, 2018
    • 2 min

    Ransomware Primer

    Learn to identify and avert data hostage situations Ransomware is malware constructed by cyber-criminals to encrypt your network data and hold it hostage until you pay their ransom. Slow Down! Use the checklist below to review messages before opening any links carefully. Safety checklist Do I know the sender? Was this an expected or a typical correspondence? Why was this email sent to me? Can the link be verified as safe? Is the email threatening and pressuring you to act imm
    53 views0 comments
    What is Phishing?
    Stan Patey
    • Apr 24, 2018
    • 3 min

    What is Phishing?

    Phishing is an exploit where cyber-criminals assume the identity of a recognized company to hook recipients into revealing credentials to accounts, personally identifiable information, or to open attachments that download dangerous malware, keystroke loggers or ransomware onto your computer and network. Familiar logos, colors, page styles and formatting, along with email addresses and domains are the reassuring bait that lures the recipient to click that link in phishing ema
    158 views0 comments

    (978) 546-3571

    51 Broadway, Rockport, MA 01966, USA

    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube

    ©2016 by Slingshot Information Systems, Inc.