by Ophtek, LLC | Jun 17, 2025 | Antivirus, Hacking, IT practices, multi factor authentication, Ophtek, Phishing, sensitive data, software updates
Believing common cybersecurity myths can leave your IT infrastructure vulnerable. Therefore, it’s important to understand the dangers behind these myths. Myth Busting the Biggest Mistakes You Could Make In today’s IT-driven business environment, PCs are...
by Ophtek, LLC | Dec 24, 2024 | BYOVD, cryptojacking, data theft, DDoS attacks, driver whitelisting, drivers, educate staff, Hacking, Ophtek, Updates
One of the recent developments in hacking has been the Bring Your Own Vulnerable Driver (BYOVD) attack, but what is it and how do you defend against one? By now, the Ophtek blog should have informed you about ransomware, trojans, and cryptojacking, but we’ve rarely...
by Ophtek, LLC | Feb 20, 2024 | gmail, Google, Google cookies, Hackers, Hacking, multi factor authentication, Ophtek, Suspicious links, suspicious software
A recently discovered vulnerability appears to allow threat actors to hack into your Google account, even if you change your password. Given that there are 1.8 billion people actively using Gmail, it should come as no surprise that Google accounts represent a...
by Ophtek, LLC | Apr 18, 2023 | breach, Go Daddy, Hacking, malware, Ophtek, Web hosting
In an admission which will severely damage their reputation, web hosting force GoDaddy has revealed its servers were under attack for several years. With a userbase of 21 million users, GoDaddy is one of the major players when it comes to providing web hosting...
by Ophtek, LLC | Jun 21, 2022 | Free WiFi, Hacking, malicious code, malicious extensions, malicious links, malicious websites, Ophtek
All organizations are at risk of being hacked, and that’s why we’re familiar with the most common forms of hacking. But what about the lesser-known hacks? With 300,000 new strains of malware being created every day, it comes as no surprise to discover that some of...
by Ophtek, LLC | May 24, 2022 | Cyber Security, Encryption, Hackers, Hacking, Network, Ophtek, pop ups
The aim of most hackers is to be discreet, but there’s almost always a tell-tale sign they’re at work. You just have to know what you’re looking for. Damage limitation is an essential part of cyber-security and, accordingly, the sooner you realize you’ve been hacked,...