Let’s set the stage: It’s a Tuesday, still the beginning of your workweek and you notice 3 separate phone calls from an unknown number within the last 2 hours. For us in MA, these phone numbers commonly begin with (855), (866), (844) and sometimes even (774) which is a common area code in central MA. It seems like these spoofing spam calls are trying to reach you more than your friends and family. It’s distracting to receive these during the workday, and sometimes frustrating when trying to figure out the overall cause. You begin to block these unknown numbers, leading to even more calls causing you to wonder if your information has been leaked online somewhere. For iPhone, MAC, and Android users the uptick in spam calls is a nuisance.
Read MoreTechnology Advisor Blog
Protect Your Workforce: Reducing Spam Calls Across Devices to Improve Productivity
Posted by Sarah Carroll on 12/15/25 12:39 PM
Tags: spam filtering, spam, Wireless, cybersecurity, spoofing
How to Spot a Phishing Email: A Quick Guide for Small Business Teams
Posted by Sarah Carroll on 6/12/25 2:39 PM
Have you ever been hooked to a phishing attempt? Did you know that phishing is involved in 70% of breaches? Whether it’s an email, phone call, or text message, these are some of the common ways bad actors use to obtain your personal and financial information for malicious gain. Phishing emails were introduced into our lives decade(s) ago and have grown increasingly creative and sophisticated with native language use and perfect grammar.
Read MoreTags: small business, phishing, Cybersecurity, email scams, cybersecurity, ransomware, data security, spoofing, Security Awareness, email spoofing
Before AI consumed our media on a daily basis, spoofing would often impersonate important figures in our lives with the malicious intent of sending misinformation for money and spreading malware. Now with AI, it has become even harder to identify these attempts to protect our friends and loved ones from the headache known as cybercrime.
Read MoreTags: computer security, cybersecurity, ransomware, cybersecurity, spoofing, cybersecurity training, Caller ID Scam
Have you experienced an increase in the number of "local" junk calls to your cell phone? You're not alone. Scammers have yet another tactic to get through to you by "spoofing" a phone number. When your phone rings and you see a local number, you're more likely to pick up. After you pick up, your number is proven to be a "real" number which is more valuable to scammers and the number of calls increases.
Read MoreTags: cybersecurity, spoofing