Skip to content
(727)-314-1919
Cornerstone IT Professionals
  • Cornerstone IT Professionals
  • About
  • Contact
  • Blog
Menu Close
  • Cornerstone IT Professionals
  • About
  • Contact
  • Blog

Cyber Security

  1. Home>
  2. Blog>
  3. Cyber Security>
  4. Page 6
Read more about the article Be Careful When Scanning QR Codes – There’s a New Scam Going Around!

Be Careful When Scanning QR Codes – There’s a New Scam Going Around!

  • Post author:Phillip Granucci
  • Post published:March 4, 2024
  • Post category:Cyber Security/Educational/Preparedness/Uncategorized
  • Post comments:0 Comments

QR codes are everywhere these days. You can find them on restaurant menus, flyers, and posters. They’re used both offline and online. QR codes are convenient and easy to use.…

Continue ReadingBe Careful When Scanning QR Codes – There’s a New Scam Going Around!
Read more about the article Watch Out for Ransomware Pretending to Be a Windows Update

Watch Out for Ransomware Pretending to Be a Windows Update

  • Post author:Phillip Granucci
  • Post published:February 19, 2024
  • Post category:Business Continuity/Cyber Security/Data Loss/Disaster Recovery/Educational/Preparedness/Tips
  • Post comments:0 Comments

Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you take action. After all, you want to keep your device safe. But…

Continue ReadingWatch Out for Ransomware Pretending to Be a Windows Update
Read more about the article A Deep Dive Into Phishing Scams

A Deep Dive Into Phishing Scams

  • Post author:Phillip Granucci
  • Post published:February 5, 2024
  • Post category:Cyber Security/Educational/Preparedness/Tips/Uncategorized
  • Post comments:0 Comments

Phishing scams remain one of the most prevalent and successful types of cyberattacks today, so being aware of the danger they pose to businesses like yours is extremely crucial. Your…

Continue ReadingA Deep Dive Into Phishing Scams
  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • Go to the next page

Recent Posts

  • 7 Surprising Ways Hackers Access Your Accounts
    7 Surprising Ways Hackers Access Your Accounts
    July 7, 2025/
    0 Comments
  • 4 Business Benefits of Implementing the Principle of Least Privilege
    4 Business Benefits of Implementing the Principle of Least Privilege
    June 3, 2025/
    0 Comments
  • Need More Reliable IT Services for Your Business?
    Need More Reliable IT Services for Your Business?
    April 4, 2025/
    0 Comments

Follow Us

  • Opens in a new tab
Copyright Cornerstone IT Professionals, Inc 2024
Close Panel

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.