Articles by Joe Michalowski

Joe Michalowski covers B2B tech topics including cybersecurity, digital transformation, IT infrastructure, and more.

How Not to Fall Victim to Social Engineering Scams
How Not to Fall Victim to Social Engineering Scams

If you’re trying to improve your cyber defenses, then understanding the threat of social engineering should be a top priority. Studies show that 84% of attackers use social engineering as an important part of their infiltration strategy against both individuals and businesses.

So what exactly is social engineering?

Joe Michalowski by Joe Michalowski April 11, 2019
What Is Spyware? Protecting Your Data Against a Common Threat
What Is Spyware? Protecting Your Data Against a Common Threat

Ransomware, cryptomining, phishing, and denial of service (DoS)—these are the types of cyber attacks that people and businesses have come to fear most in recent years.

However, with all the attention paid to these kinds of high-profile attacks, defending against spyware is becoming less of a concern. The problem is that even now, spyware is still the most common way for attackers to conduct cybercrime against businesses.

Joe Michalowski by Joe Michalowski March 31, 2019
What Is Spoofing? And How to Mitigate an Under-the-Radar Threat
What Is Spoofing? And How to Mitigate an Under-the-Radar Threat

In 2017, a man was arrested for stealing $100 million from two tech companies by launching an elaborate cyber attack. He didn’t use ransomware. And he didn’t use some kind of advanced, zero-day malware.

The attacker took an approach that typically gets less attention than the latest and greatest threats — it’s known as spoofing.

Joe Michalowski by Joe Michalowski March 24, 2019
What Is a Zero-Day Exploit? And How to Defend Yourself in 2019
What Is a Zero-Day Exploit? And How to Defend Yourself in 2019

You kept your antivirus software up-to-date. You had a firewall in place. Your employees went through all necessary cybersecurity awareness training.

And yet, your company still experienced a security incident. Now, you’re left wondering—what is a zero-day exploit (and how did it get past my cyber defenses)?

Joe Michalowski by Joe Michalowski March 13, 2019