cyber security

/cyber security

Top 5 Cybersecurity Things Small Businesses Need To Know

Well hello there reader! To start things off, a brief history on the origins of Bsquared Intel. From 2017-2018 we entered into the personal brand reputation arena because our OSINT skills are useful in finding information that a client would want to know should they need to holistically polish up their image. Our frustration with [...]

PayPal SMiShing Attack: A Closer Look

If you’ve been reading our blog, you’ll recall not too long ago we dug into a SMiShing attempt that was not super common because of it’s use of punycode. This previous article also discussed what SMiShing is, the victim impact of this activity from the FBI’s Internet Crime Report, and ways spammers/scammers get your phone [...]

Hurricane Season Is Here: Prepping Your Technology

The National Oceanic and Atmospheric Administration (NOAA) is predicting a very active 2022 Hurricane Season [Link]. In this article we’re going to to talk about prepping your technology for a storm. First and foremost, your life and safety are priority number one, as well as those you are responsible for. Ensure that you have evacuation [...]

Small Businesses, Here Are 4 Risks When Letting a Third Party Manage Your Domain Name

Hey there small business owner reader who hired someone to build your website and who also purchased your domain name for you. Have you thought about what could go wrong if something happened to the person who registered your domain name? Your domain name is an important digital business assets you own. Firstly, it’s what [...]

Unsuccessful Punycode Smishing Attack Leads to More Questions Than Answers

It’s been a while since we’ve done anything investigative, so in this article we’re going to pick apart a SMiSHing attempt we received. This one is a little more on the technical side because punycode is used in this attack, so we’ll do our best to break it down. Because this attempt is so poorly [...]

How Social Media Undermines Your Organization’s Security

The best place to start for this entry is the opening months of the pandemic. We begin here because there was an inflection point in social media use mid-March 2020. As society-at-large was in lockdown trying to figure out what was happening, there was a nearly 25% increase in people using social media apps, according [...]

Privacy Policy Ideas and Other Privacy Matters

We run a monthly cybersecurity meet up and at our last meeting we focused on privacy policies. While they're not the most glamours things too look at, we wanted to share some privacy policy ideas and other privacy matters that popped up in the conversation. The first of which we’ll touch upon relates to consultants/contractors [...]

What Is a Cybersecurity Framework and What To Expect When Building It Out

Around July of 2021, we wrote about one of Connecticut’s new cybesecurity laws, which you can find here[Link]. Our disclaimer still stands that we aren’t lawyers, so if this law affects your organization, please consult with a knowledgeable attorney. While that post was a regurgitation of the law, we didn’t talk about cybersecurity frameworks themselves. [...]

How To Know if Stalkerware Is on a Device

A warning to anyone reading this in an abusive/toxic relationship If you’re reading this article, you’ve most likely searched for something like “how do i know if stalkerware is on my device” or something to that nature. Assume that your partner can see this. Before you decide to get rid of any stalkerware, make sure [...]

Yet Another Cybersecurity Prediction Article For 2022

As tradition in the InfoSec world dictates, it’s time for us to prognosticate what 2022 is going to look like with cyber attacks and other issues. Log4j As of right now, Log4j will be the gift that keeps on giving. To catch up on Log4j/log4shell stuff, check out our article that we’ve been updating. Because [...]