CbtechSupport's profile picture. You’re fighting technology and working all the time. What you need is to hire a CIO and a Technology Alignment Manager, and build a helpdesk. Or have us do it!

CBTech Support

@CbtechSupport

You’re fighting technology and working all the time. What you need is to hire a CIO and a Technology Alignment Manager, and build a helpdesk. Or have us do it!

Pinned

Sign up for our Timely Tech Tips newsletter: bit.ly/CBTech-Tips


BEC scams trick employees into thinking they’re receiving legitimate emails from a boss, vendor, or trusted partner. They often pressure you to send money, buy gift cards, or share sensitive info. Stay alert, slow down, and always verify.

CbtechSupport's tweet image. BEC scams trick employees into thinking they’re receiving legitimate emails from a boss, vendor, or trusted partner. They often pressure you to send money, buy gift cards, or share sensitive info. Stay alert, slow down, and always verify.

Wrapping up Cybersecurity Awareness Month, let's focus on culture. Creating a culture of security means making safe practices part of everyday work instead of an afterthought. Check out this month's newsletter: bit.ly/4hHB5hm

CbtechSupport's tweet image. Wrapping up Cybersecurity Awareness Month, let's focus on culture. Creating a culture of security means making safe practices part of everyday work instead of an afterthought. Check out this month's newsletter: bit.ly/4hHB5hm

When the pressure is high, the data is sensitive, & customers are watching, the instinct is to pay the ransom & make it all disappear. But paying doesn’t guarantee safety — it rewards cybercriminals and often leads to more attacks down the line.

CbtechSupport's tweet image. When the pressure is high, the data is sensitive, & customers are watching, the instinct is to pay the ransom & make it all disappear. But paying doesn’t guarantee safety — it rewards cybercriminals and often leads to more attacks down the line.

Brushing scams - fraudulent sellers create fake accounts in your name & use your address to “prove” deliveries were made. This allows them to post reviews under your identity & boost their products. Check out the rest of the newsletter here: bit.ly/48D0NRk

CbtechSupport's tweet image. Brushing scams - fraudulent sellers create fake accounts in your name & use your address to “prove” deliveries were made. This allows them to post reviews under your identity & boost their products. Check out the rest of the newsletter here: bit.ly/48D0NRk

Did you know that over 55% of avid video-game players have experienced an account breach at some point? Password hygiene for gaming accounts is just as important as it is for your other personal and work accounts.

CbtechSupport's tweet image. Did you know that over 55% of avid video-game players have experienced an account breach at some point? Password hygiene for gaming accounts is just as important as it is for your other personal and work accounts.

Just because an email looks internal doesn’t mean it’s safe. Learn 3 cybersecurity lessons from the latest Microsoft Direct Send phishing threat. 👉 bit.ly/CBTech-blog

CbtechSupport's tweet image. Just because an email looks internal doesn’t mean it’s safe. Learn 3 cybersecurity lessons from the latest Microsoft Direct Send phishing threat. 👉 bit.ly/CBTech-blog

Need to bring an email into the conversation fast? Share an Outlook email directly to Microsoft Teams with the Share to Teams button. The email & attachments will land in Teams as a message, keeping your team in the loop without the copy/paste mess.

CbtechSupport's tweet image. Need to bring an email into the conversation fast? Share an Outlook email directly to Microsoft Teams with the Share to Teams button. The email & attachments will land in Teams as a message, keeping your team in the loop without the copy/paste mess.

These texts look legit, but they’re really phishing attempts trying to trick you into giving up personal info. In situations like this: Don’t tap or reply; Open the official app or type the website yourself; Use your phone’s “Report Junk/Spam”.

CbtechSupport's tweet image. These texts look legit, but they’re really phishing attempts trying to trick you into giving up personal info. In situations like this: Don’t tap or reply; Open the official app or type the website yourself; Use your phone’s “Report Junk/Spam”.

Think a password manager sounds scary? You’re not alone — but it is safe, and setting one up is a lot easier than you think. Follow these simple steps and you’ll be surprised how quickly you gain control over your logins.

CbtechSupport's tweet image. Think a password manager sounds scary? You’re not alone — but it is safe, and setting one up is a lot easier than you think. Follow these simple steps and you’ll be surprised how quickly you gain control over your logins.

As summer winds down, we thought it would be a good time for some tips on how to unplug, whether you’re taking a trip or just want a day away from technology. Check out this month's blog post: bit.ly/CBTech-blog

CbtechSupport's tweet image. As summer winds down, we thought it would be a good time for some tips on how to unplug, whether you’re taking a trip or just want a day away from technology. Check out this month's blog post: bit.ly/CBTech-blog

Treat your retiring wearable with the same caution as you would a work laptop or smartphone. If not properly wiped & delinked, the next owner could gain access to your PII or company data. Check out the video: bit.ly/45dD7RJ

CbtechSupport's tweet image. Treat your retiring wearable with the same caution as you would a work laptop or smartphone. If not properly wiped & delinked, the next owner could gain access to your PII or company data. Check out the video: bit.ly/45dD7RJ

Do you know if your AI chats are private? Users of Meta’s AI chatbot app unknowingly shared highly personal details on a public feed. Before you hit "Share", make sure you know what’s visible and how to keep your conversations private.

CbtechSupport's tweet image. Do you know if your AI chats are private? Users of Meta’s AI chatbot app unknowingly shared highly personal details on a public feed. Before you hit "Share", make sure you know what’s visible and how to keep your conversations private.

Check out our blog post for 5 Things to Consider When Buying a Computer for Your College-Bound Student: bit.ly/CBTech-blog. #1 - Check the School’s Recommendations First!

CbtechSupport's tweet image. Check out our blog post for 5 Things to Consider When Buying a Computer for Your College-Bound Student: bit.ly/CBTech-blog. #1 - Check the School’s Recommendations First!

Employees may adopt AI to boost productivity, but this can pose security and compliance risks. Before using an AI tool: don't assume a tool is safe just because it's popular; check your company's AI usage policy; confirm with IT that the tool is approved.

CbtechSupport's tweet image. Employees may adopt AI to boost productivity, but this can pose security and compliance risks. Before using an AI tool: don't assume a tool is safe just because it's popular; check your company's AI usage policy; confirm with IT that the tool is approved.

While this email might be clever marketing, it's also an important lesson: not every phish starts with a scary warning or fake invoice; some start with a gift. Is it unusual, unexpected, or “too clever to ignore”? Slow down, stay cautious.

CbtechSupport's tweet image. While this email might be clever marketing, it's also an important lesson: not every phish starts with a scary warning or fake invoice; some start with a gift. Is it unusual, unexpected, or “too clever to ignore”? Slow down, stay cautious.

Wishing you all a happy and safe 4th of July!

CbtechSupport's tweet image. Wishing you all a happy and safe 4th of July!

Say goodbye to messy backgrounds in your images! Microsoft PowerPoint lets you clean up images like a pro so you can easily create a professional, picture-perfect presentation.

CbtechSupport's tweet image. Say goodbye to messy backgrounds in your images! Microsoft PowerPoint lets you clean up images like a pro so you can easily create a professional, picture-perfect presentation.

Cybersecurity training aims to elevate a person’s awareness of threats so they can recognize them before falling victim. Why should your company implement this training more than just once a year or quarter? Read more here: bit.ly/CBTech-blog

CbtechSupport's tweet image. Cybersecurity training aims to elevate a person’s awareness of threats so they can recognize them before falling victim. Why should your company implement this training more than just once a year or quarter? Read more here: bit.ly/CBTech-blog

If your computer 🖥 isn’t just purring 🐈—it’s roaring 🦁, you might have a bigger problem on your hands! It’s time to call IT and have them investigate.

CbtechSupport's tweet image. If your computer 🖥 isn’t just purring 🐈—it’s roaring 🦁, you might have a bigger problem on your hands! It’s time to call IT and have them investigate.

A lost or stolen device is a major inconvenience... and a cybersecurity risk. Protect the sensitive data stored on it by following these steps! And always report it to your company's IT department/company/person.

CbtechSupport's tweet image. A lost or stolen device is a major inconvenience... and a cybersecurity risk. Protect the sensitive data stored on it by following these steps! And always report it to your company's IT department/company/person.

Loading...

Something went wrong.


Something went wrong.