Blog

Pendello Solutions Pendello Solutions

What Is Credential Stuffing?

Credential stuffing is when hackers use stolen username and password pairs from a breach to gain access to your user accounts.

Read More
Pendello Solutions Pendello Solutions

Still Experiencing "Zoom Fatigue?"

Many of us are still using virtual meetings reasonably consistently, and I can guess that all of us are tired of seeing our own faces during these calls

Read More
Pendello Solutions Pendello Solutions

Do You Have A Plan?

According to recent statistics, there is a good chance any one of us could be one of the victims that is hit every 11 seconds. 

Read More
Pendello Solutions Pendello Solutions

Cybersecurity Common Sense

Most Americans don't seem to realize the risk that they put themselves in with careless and sloppy cyber behaviors.

Read More
Pendello Solutions Pendello Solutions

Cybersecurity Superheroes Unite

Cybercrime isn’t just happening in the dark rooms of foreign shores, the danger is right here, and the “bad guys” are infiltrating any business they can.

Read More
Pendello Solutions Pendello Solutions

Degree Of Awareness

Hackers know our weaknesses; they know how to gain our trust and they customize their attacks based on the audience. 

Read More
Pendello Solutions Pendello Solutions

Don't Delay, Update Today!

One way to keep your cybersecurity stance and digital identity safer is to allow those updates to happen as soon as they are released.

Read More
Pendello Solutions Pendello Solutions

Classes Canceled Due To Ransomware

This ransomware attack on Howard University brought to light the consideration of how deep and wide the net can be cast on any one entity.

Read More
Pendello Solutions Pendello Solutions

Collective Action Against Cybercrime

A meeting with President Biden and those within the private sector was held recently to unify efforts in fighting the battle against cybercrimes.

Read More
Pendello Solutions Pendello Solutions

T-Mobile Data Breach

T-Mobile learned of a recent data breach via claims that were made on an online forum. What should you be aware of?

Read More
Pendello Solutions Pendello Solutions

How To Work Offline In Outlook

What if you were able set aside some time during the day where interruptions were minimized? How much work could you get done?

Read More
Pendello Solutions Pendello Solutions

Cybercrime Trends

How are cybercriminals doing it? While you may be familiar with the different types of attack strategies, let's just take a deeper look.

Read More
Pendello Solutions Pendello Solutions

HIPAA Vs Cybersecure

The healthcare community needs to be HIPAA compliant but, there is a great deal of confusion about being HIPAA compliant and cyber-secure

Read More
Pendello Solutions Pendello Solutions

The Ransomware Gamble

You need to know the signs to look for when it comes to dangerous links, attachments and fraudulent websites so that you can avoid a potential catastrophe.

Read More