Home

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!
SpaceBound Solutions Blog
Google suggests you Update Chrome Browser Immediately due to Security Flaws
May 3

May 3 Google suggests you Update Chrome Browser Immediately due to Security Flaws

Bob
Cybersecurity

The update fixes 30 security flaws, 7 of which were deemed “high level threats”.

5 Cybersecurity Mistakes you’re Making
Apr 28

Apr 28 5 Cybersecurity Mistakes you’re Making

Bob
Cybersecurity

Avoid making these 5 cybersecurity mistakes to keep your information safer online.

Leaked Documents Shed Light on how Okta, Sitel Reacted to Lapsus$ Breach
Apr 26

Apr 26 Leaked Documents Shed Light on how Okta, Sitel Reacted to Lapsus$ Breach

Bob
Cybersecurity

The documents include an “Intrusion Timeline”, that provides more detail behind the Okta attack.

Study Shows Organizations are more willing to Pay Ransom than Ever Before
Apr 21

Apr 21 Study Shows Organizations are more willing to Pay Ransom than Ever Before

Bob
Cybersecurity

According to the report, the number of organizations paying ransom is increasing, but so are payment amounts.

3 Ways School IT Teams can Better Manage Chromebooks
Apr 19

Apr 19 3 Ways School IT Teams can Better Manage Chromebooks

Bob
Education

Using these recommendations, school IT departments can better manage their school’s Chromebook fleet.

If you get a Text Message from Yourself, Do Not Answer
Apr 14

Apr 14 If you get a Text Message from Yourself, Do Not Answer

Bob
Cybersecurity

The text messages offer customers a “free gift” for paying their March bills

5 Types of Social Engineering Attacks and how to combat them
Apr 12

Apr 12 5 Types of Social Engineering Attacks and how to combat them

Bob
Cybersecurity

Here are five common social engineering attacks cybercriminals will use to compromise your information

National Spelling Bee Website Compromised by Cyber Attackers
Apr 7

Apr 7 National Spelling Bee Website Compromised by Cyber Attackers

Bob
Cybersecurity

In public filings, it was noted that roughly 54,800 emails were vulnerable in the attack

How Teachers can incorporate 3D Printing into their Lesson Plans
Apr 5

Apr 5 How Teachers can incorporate 3D Printing into their Lesson Plans

Bob
3D Printing, Education

3D printing has made considerable advancements in the academic world. Here are ways educators can incorporate it into their classroom

UPDATE: A Teenager is reportedly the Mastermind behind Lapsus$
Mar 31

Mar 31 UPDATE: A Teenager is reportedly the Mastermind behind Lapsus$

Bob
Cybersecurity

Originally thought to be in South America, the mastermind behind Lapsus$ is actually suspected to be in England - although there are still ties to Brazil

Digital Extortion Gang Lapsus$ takes Credit for Microsoft, Okta Breaches
Mar 29

Mar 29 Digital Extortion Gang Lapsus$ takes Credit for Microsoft, Okta Breaches

Bob
Cybersecurity

The relatively new cybersecurity criminals have built up an impressive resume, despite researcher belief that they are not yet that well established

Emotet Malware is being packaged in a Fake IRS Email
Mar 24

Mar 24 Emotet Malware is being packaged in a Fake IRS Email

Bob
Network Security, Cybersecurity

The email includes a .ZIP file that is used to infect the victim’s computer and network

Firefox Users Asked to Upgrade after Two Zero-Day Vulnerabilities are Discovered
Mar 22

Mar 22 Firefox Users Asked to Upgrade after Two Zero-Day Vulnerabilities are Discovered

Bob
Cybersecurity

Mozilla acknowledged that they have had reports of “attacks in the wild”, but have not released more details

New FBI Warning details how you can protect yourself from “SIM Swapping”
Mar 10

Mar 10 New FBI Warning details how you can protect yourself from “SIM Swapping”

Bob
Cybersecurity

This dangerous technique can allow hackers to steal your information without even being involved

Six Email Security Trends to Pay Attention to in 2022
Mar 8

Mar 8 Six Email Security Trends to Pay Attention to in 2022

Bob
Cloud, Cybersecurity

Email is still used as one of the most common ways cybercriminals breach a network.

Instagram Accounts with High Follower Counts Targeted in Phishing Scheme
Mar 3

Mar 3 Instagram Accounts with High Follower Counts Targeted in Phishing Scheme

Bob
Cybersecurity, Social Media

The scheme sends a fake notice citing copyright infringement to steal user credentials

Joint Advisory Issued as “Sophisticated, High Impact” Ransomware Surges
Mar 1

Mar 1 Joint Advisory Issued as “Sophisticated, High Impact” Ransomware Surges

Bob
Cybersecurity

Agencies in the US, UK and Australia have released a joint advisory in response to a surge in ransomware attacks

The Cybersecurity Long Game
Feb 24

Feb 24 The Cybersecurity Long Game

Bob
Cybersecurity

4 cybersecurity experts with different perspectives weight in and give their insight on the future of cybersecurity

3 AI Trends to Watch for in 2022 K-12 Environments
Feb 22

Feb 22 3 AI Trends to Watch for in 2022 K-12 Environments

Bob
AI, Education

With AI and ML gaining traction in U.S. classrooms, here are 3 trends to look for in 2022

What is BlackCat Ransomware and why is it Different?
Feb 17

Feb 17 What is BlackCat Ransomware and why is it Different?

Bob
Cybersecurity

BlackCat is a cause for concern because it does more than just extort its victims for money.

Load More

Stay Connected.

Subscribe to our newsletter for the latest tech news, and info on services, solutions and future events!

Thank you!

Powered by Squarespace