Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unfortunately, Scams Are Commonplace

Unfortunately, Scams Are Commonplace

The constant fear of falling victim to scams has become a harsh reality and is far from ideal. However, the good news is that there is always time to acquire the skills needed to avoid such scams. Let's explore ways to enhance awareness regarding the challenges posed by scams, not only in a business context but also in everyday life.

0 Comments
Continue reading

The Danger Of Holiday Phishing Scams: How To Recognize And Avoid Them To Stay Safe This Holiday Season

November_Blog_3

The holiday season is in full swing, which means so are the cybercriminals! While you’re making holiday gift lists, they’re plotting and scheming new ways to take advantage of unsuspecting online shoppers. Holiday phishing scams have become an all-too-common threat, targeting customers to steal personal information, financial data and even identities.

Tags:
0 Comments
Continue reading

May A Force Field Be With You

November_PH_Blog_2

“That won’t happen to me” is something many business owners say when discussing cyberscams and the need for adequate protections for their business, but these days it’s getting to be a really, really stupid statement that you definitely don’t want your clients, employees and banker to hear.

0 Comments
Continue reading

Tip of the Week: Worried About Phishing? Use the SLAM Method

Tip of the Week: Worried About Phishing? Use the SLAM Method

Phishing is a very real, very dangerous threat to modern businesses, which makes it extremely important that you and your whole team are prepared to spot and mitigate it. One simple framework to do so is known as the SLAM method, so let’s take a few moments to review some tips for using it.

0 Comments
Continue reading

Smishing: A Variety of Phishing Attacks Utilizing SMS

Smishing: A Variety of Phishing Attacks Utilizing SMS

We discuss phishing often on this blog, and one method that often flies under the radar is smishing, or phishing that is conducted through SMS messages. Although email phishing is perhaps the most common method of conducting these scams, you should also be prepared to take on smishing, as it comes with its own share of unique challenges and dangers.

0 Comments
Continue reading

How Good is Consumer Reports’ Scam Prevention Advice?

How Good is Consumer Reports’ Scam Prevention Advice?

Scams are everywhere in our highly digitized world, which makes it especially important that everyone is prepared to deal with them—both personally and professionally. The publication Consumer Reports’ cover feature for its August 2023 edition is dedicated to exactly this goal: helping its readers avoid the various scams and threats out there. Let’s look at some of the advice shared in the article, and compare it to the best practices we recommend.

0 Comments
Continue reading

Dissecting the Lessons from a Recent Amazon Scam Warning Email

Dissecting the Lessons from a Recent Amazon Scam Warning Email

Amazon Prime subscribers recently received an email from the online marketplace, warning them of the prevalence of scams that took advantage of their offerings and brand recognition. Let’s go through the advice that this email shared, and compare it to the best practices we recommend for avoiding scams.

0 Comments
Continue reading

What are (Probably) Your Biggest Cybersecurity Threats?

What are (Probably) Your Biggest Cybersecurity Threats?

Of all the cybersecurity threats out there for your business to contend with, there are going to be a few of them that are just more likely to impact you than others. That’s just a statistical reality. Fortunately, these threats can be addressed, so let’s discuss how you can do so.

0 Comments
Continue reading

Can AI Be Trusted to Stop Phishing?

Can AI Be Trusted to Stop Phishing?

AI—artificial intelligence—has been a hot topic as of late, with it seemingly being used for any purpose you can imagine nowadays. Unfortunately, this has also included cybercrime.

However, just as AI can be a weapon for cybercriminals to use, it can also be a shield to help protect your business from threats. For instance, in phishing prevention.

0 Comments
Continue reading

Not Even Voicemails are Safe from Phishing

Not Even Voicemails are Safe from Phishing

Phishing attacks have consistently been prominent in cybercrime throughout the past few years, not only due to their efficacy but also because there are so many avenues wherein phishing can be attempted. The first that comes to mind is email, of course, but you and your team need to keep these others in mind.

Take, for instance, a phishing voicemail…dubbed, naturally, a “phoicemail.”

0 Comments
Continue reading

Ransomware Costs You More than Just the Ransom

Ransomware Costs You More than Just the Ransom

Okay, let’s say you’ve been infected by a ransomware attack, and (against our advice) you’ve elected to pay the ransom. That’s the biggest cost that comes with it, right?

Unfortunately, wrong. A ransomware attack comes with a lot more financial impact than just the payment the attacker demands. Let’s go over some of these other costs that can actually outpace that of the ransom.

0 Comments
Continue reading

What is Social Engineering, and How Can I Stop It?

What is Social Engineering, and How Can I Stop It?

Let me ask you a few questions—first, how confident are you that you could spot an online ruse, and second, did you know there’s a stain on your shirt right now?

Did you look?

If so, you’ve just fallen for the school playground version of social engineering, a serious threat. Let’s discuss the kind that you’re more likely to see in terms of your business’ cybersecurity.

0 Comments
Continue reading

While Fun, Those Social Media Quizzes Can be Dangerous

While Fun, Those Social Media Quizzes Can be Dangerous

We’ve all seen our friends and family sharing quizzes on their social media profiles, prompting people to find out what their celebrity stage name or what Hogwarts house you would be in, or to share what their first concert experience was. These fun, lighthearted quizzes are a great way to get to know a little more about the people we’re connected with… and that’s the biggest problem.

0 Comments
Continue reading

Learning Telltale Signs of a Phishing Email Can Save Your Business

Learning Telltale Signs of a Phishing Email Can Save Your Business

Phishing is one of those threats that has been around for a long time, and as time passes by, these threats only become more difficult to identify. Some businesses can’t tell the difference between phishing scams and actual emails. Here’s how your company can take steps toward properly identifying and responding to phishing emails.

0 Comments
Continue reading

The Most Popular Subject Lines for Phishing Threats are Revealing

The Most Popular Subject Lines for Phishing Threats are Revealing

Even the most cautious employee could fall victim to a well-placed and well-timed phishing email. What are some factors that contribute to the success of these attacks, and what subject lines in particular should people be cautious about? A recent study takes a look at what goes into a successful phishing attack, and you might be surprised by the results.

0 Comments
Continue reading

How to Identify Spam and Phishing Emails

How to Identify Spam and Phishing Emails

Out of all the email messages you get throughout the workday, how many of them are spam messages or malicious emails from hackers trying to get at your credentials? You don’t need us to tell you that spam and phishing emails are a serious problem, but sometimes they can be a bit difficult to identify—especially to the untrained or uninformed eye. Let’s go over some of the telltale signs of spam and phishing emails, as well as how you should react to them.

0 Comments
Continue reading

How to Spot a Phishing Attempt

How to Spot a Phishing Attempt

With email being such a huge part of doing business, phishing has become a favorite tool of many scammers. To fight back, it is key that you know how to recognize a phishing email, so we’re dedicating some time to doing just that.

0 Comments
Continue reading

Have You Prepared Your Employees to Catch Phishing Attempts?

Have You Prepared Your Employees to Catch Phishing Attempts?

While it initially sounds promising to hear that the number of data breaches seen last year went down significantly, it is important to recognize that the number of data records leaked as a result more than doubled. One clear cause was the resurgence in the use of the underhanded malware variety known as ransomware. With this suggesting an increased threat of ransomware incoming, can you confidently say that your business’ team is ready to deal with it?

0 Comments
Continue reading

When the People You Trust Phish You

When the People You Trust Phish You

Having success in business often relies on developing trustworthy relationships. You have to trust your vendors and suppliers to get you the resources you need, you need to trust your staff to complete their tasks without putting your business in harm's way, and you need to trust your customers to buy the products and services that you offer. Running counter to these necessary bonds of trust are people actively soliciting people’s time, energy, money, and attention for their own selfish purposes.

0 Comments
Continue reading

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
1141 S. 2nd Street
Louisville, Kentucky 40203

Copyright Argentum IT. All Rights Reserved.