Blog

Rehmann adds Trivalent Group, expanding technology services and launching managed IT solutions practice

TROY, Mich., March 19, 2018 – Rehmann, a top 40 accounting and advisory firm, and Trivalent Group®, a top 100 managed IT service provider, will combine effective April 1. This unique combination brings together two established firms, launching a managed IT solutions practice that will broaden both firms’ service offerings. Backed by experienced engineers, technicians and […]

Trivalent in the News: $5K Reward in Lake Michigan CU Fraud Case (WOOD TV8)

GRAND RAPIDS, Mich. (WOOD) — A skimmer was used in the fraud scheme that stole money from scores of Lake Michigan Credit Union accounts earlier this month, a source close to the investigation told 24 Hour News 8 Tuesday. The source also said the fraud may be connected to other crimes across state lines. The […]

W-2 Phishing Scams Likely to Resurface After the New Year

W-2 phishing season is just a few weeks away.  For the past several tax seasons, cyber criminals have duped hundreds of payroll departments into providing W-2 information on their employees, which results in the filing of fraudulent tax returns and other identity theft issues.  These attacks are incredibly disruptive to employees, extremely expensive for employers […]

Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

When poet Alexander Pope first said “to err is human,” he probably didn’t realize how prescient those words were in capturing the world of cybersecurity. Yes, the root cause of most security breaches can be traced to human actions, or lack thereof. However, the bigger mistake is to believe that cybersecurity can be attained simply by correcting […]

Video: “The Future of InfoSec” Keynote by WatchGuard CTO Corey Nachreiner (2017 Michigan Cyber Security Conference)

WatchGuard Technologies’ Corey Nachreiner, (CTO, CISSP) delivers his “The Future of InfoSec” keynote at the 2017 Michigan Cyber Security Conference. Visit www.michigancybersecurity.com for a complete wrap-up and information on the 2018 Conference!  

There Are 1.9 Billion Stolen Passwords and Usernames Available on the Black Market, and Up to 25% of Them Will Still Work on a Google Account

There are hundreds of millions of usernames and passwords traded on black markets that can be used to access Google accounts, write Google and Berkeley researchers in a major new paper. The study, published over the weekend, uses Google’s own, carefully controlled internal “proprietary data” as a case-study to see whether the hacked passwords and other accounts traded on hacker […]

The Devious Netflix Phish that Just Won’t Die

The email hits your inbox with an urgent warning: Your Netflix account has been suspended, due to a problem with your billing information. It offers a link, which takes you to what looks very much like a Netflix landing page. It’s not. Instead, it’s a phishing scam that collects extensive personal data on victims. But as with all […]

KRACK Wi-Fi Attack Threatens All Networks: How to Stay Safe and What You Need to Know

A devastating flaw in Wi-Fi’s WPA security protocol makes it possible for attackers to eavesdrop on your data when you connect to Wi-Fi. Dubbed KRACK, the issue affects the Wi-Fi protocol itself—not specific products or implementations—and “works against all modern protected Wi-Fi networks,” according to Mathy Vanhoef, the researcher that discovered it. That means that if your device […]

iOS Password Popup Indistinguishable From Phishing Scam

Every iOS user is familiar with the popups that require an Apple ID password before completing a task; muscle memory usually takes over to type the secret code and “sign in.” But, according to mobile developer Felix Krause, iDevice owners should think twice before handing over credentials. In a recent blog post, Krause shines the light […]

How to Protect your Credit Rating in Light of the Equifax Data Breach

Follow these steps on a regular basis: Early detection and immediate action is the only way to limit the damage that’s done when your personal information is fraudulently accessed and used. Here are a few steps you can do to help detect and reduce the possibility that your personal account information is used fraudulently: NEVER […]