Tech Update Ashley Adkins Tech Update Ashley Adkins

Juice Jacking: How to Protect Your Devices from Public Charging Stations

Juice jacking is a real threat. Criminals can use public charging stations to steal data or infect your phone with malware. Here's how to protect yourself:

  • Always carry your own charger and cable.

  • If you must use a public charging station, look for one in a well-lit and public area.

  • Before you plug in your device, check the charging port for any signs of tampering.

  • Use a USB data blocker.

By following these tips, you can help protect yourself from juice jacking.

Read More
Tech Update Ashley Adkins Tech Update Ashley Adkins

Your Phone: An Essential Component of Your Cyber Security Strategy

At Adkinsio, we understand the importance of keeping our phones secure. Our phones are more than just communication devices - they hold a wealth of personal and sensitive information, such as financial details, personal messages, banking apps, photos, and contact information. This is why it's crucial to ensure that our phones are as secure as any other device in our workplace.

Read More
Tech Update Ashley Adkins Tech Update Ashley Adkins

Stay Alert: The Latest Clever Phishing Scam Targeting Businesses

As an IT support business, Adkinsio is always on the lookout for the latest threats to our clients' security. Recently, we've come across a particularly devious phishing scam that's targeting businesses. Cybercriminals are using a well-known brand name to trick people into opening an email that appears to be from a widely used e-signature platform. The attached image is loaded with empty svg files that are encoded in an HTML file attachment.

Read More
Tech Update Ashley Adkins Tech Update Ashley Adkins

3 Quick Ways to Improve Your Cloud Security

When using cloud services, you may take advantage of their convenient, remote working options and awesome features. However, it is essential to ensure that your information is kept secure. Here are three steps you can take today to ensure the security of your data.

Read More