Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Capstone Works Blog

Capstone Works, Inc. has been serving the Cedar Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Business Survive a Ransomware Attack?

Could Your Business Survive a Ransomware Attack?

Ransomware is every business owner’s worst nightmare. It not only brings with it an aura of desperation, but it also brings with it numerous practical issues that can really harm a business. It is not overstating that it is one of the most abrupt and serious problems that a business can have with its technology. 

0 Comments
Continue reading

3 Huge Unexpected Cybersecurity Risks Your Staff Needs to Know About, Today

3 Huge Unexpected Cybersecurity Risks Your Staff Needs to Know About, Today

Most people these days are somewhat familiar with the traditional attack vectors of cybercriminals. Because of this, the bad guys are always exploring alternative options for spreading malware and stealing data, often in places where you would least expect it.

Here are three unexpected cybersecurity risks that you and your staff need to be aware of.

0 Comments
Continue reading

Austin Texas Businesses Face Growing Cybersecurity Concerns

Austin Texas Businesses Face Growing Cybersecurity Concerns

Austin, Texas is undeniably one of the world’s largest tech hubs. Some of the largest tech companies in the world have installed themselves in Austin thanks to a large number of factors. For instance, the cost of living tends to be much more reasonable compared to other tech-based cities, the lack of state income taxes attracts business, and the generally nice year-round weather and recreational scene attract great people who want to accomplish great things. We love it here, from the growth opportunities, the talent pool, right down to the Keep Austin Weird bumper stickers.

But Austin businesses do face some additional challenges that come with being some of the brightest, most forward-thinking organizations out there.

0 Comments
Continue reading

AI is the New Secret Weapon for Cybersecurity

AI is the New Secret Weapon for Cybersecurity

AI has been the buzzword of the year when it comes to the technology world, and for good reason. While what we know of as “AI” isn’t necessarily new, and it isn’t even technically artificial intelligence, it’s definitely becoming a groundbreaking new industry that is changing the way a lot of businesses and individuals do things. That being said, like all technologies, it can and will be used for nefarious purposes.

0 Comments
Continue reading

How to Steal a Password in Three Easy Steps

How to Steal a Password in Three Easy Steps

For most people, the only thing protecting all of their personal data, their email, access to all of their online accounts, their bank, and more, is just a handful of characters. It’s estimated that there is about a 20% chance that any given account doesn’t have any sort of multi-factor security, so if you can figure out a person’s password, you might be able to gain access to whatever you want.

0 Comments
Continue reading

What is 2FA, and How Can Businesses Use it to Improve Security?

What is 2FA, and How Can Businesses Use it to Improve Security?

Data and network security has to be a paramount consideration for any organization that depends on its IT. This means doing whatever it takes to keep unauthorized entities, whether they be human or machine, out of your network. One strategy that can help you strengthen your organizational cybersecurity is to enact a feature that is found on many password-driven accounts: two-factor authentication.

0 Comments
Continue reading

4 Sneaky Tricks that Cybercriminals are Using Against Texas Businesses

4 Sneaky Tricks that Cybercriminals are Using Against Texas Businesses

We’ve been talking about cybersecurity quite a bit lately, and for good reason. Any organization that doesn’t acknowledge the threat that comes with being ill-prepared in the face of a cyberattack is basically sitting on a ticking time bomb. 

0 Comments
Continue reading

Think Before You Click - 6 Critical Cybersecurity Habits Your Employees Need to Build

Think Before You Click - 6 Critical Cybersecurity Habits Your Employees Need to Build

Business cybersecurity, and all its assorted intricacies and requirements, can be a real challenge for organizations of all sizes to deal with—particularly because it depends so much on employee engagement. That being said, there are a few things you can do to help boost your team’s cybersecurity awareness by promoting more secure behaviors.

0 Comments
Continue reading

New 2023 Cybercrime Trends that Austin Businesses Need to Prepare For

New 2023 Cybercrime Trends that Austin Businesses Need to Prepare For

The last few years have seen an unsettling jump in cybercrime rates, with more businesses struck by various attacks, ransomware, and data breaches. Phishing attacks against end users haven’t slowed down, either—in fact, they’ve become effective enough that even the pros can be tricked. Let’s consider some of the cybercrime trends we anticipate to see in 2023.

0 Comments
Continue reading

Tips to Avoid Getting Scammed at Home, School and Work

Tips to Avoid Getting Scammed at Home, School and Work

Let’s cut to the chase: scams are everywhere out there today, which makes it important that you are aware of how to avoid them. Let’s run through a few basic tips we always recommend.

0 Comments
Continue reading

Texas Cybersecurity Directly Linked with Financial Losses

Texas Cybersecurity Directly Linked with Financial Losses

They say that everything’s bigger in Texas. Unfortunately, as of late this includes the losses that businesses incur to cybercriminal activity. Let’s discuss how serious this problem is, and what you need to do to keep it from harming your business.

0 Comments
Continue reading

The Definitive Guide on Spotting a Phishing Attack

The Definitive Guide on Spotting a Phishing Attack

Phishing is one of the leading vectors for larger cyberattacks, and right now, it’s the biggest cyberthreat for Texas-based businesses. In this guide, we’re going to cover what to look for. If you are a business owner, we recommend sharing this blog with your entire staff and asking that they read and confirm they understand it. Go ahead and share it as much as you want—if you find it useful, we’d love to hear from you!

0 Comments
Continue reading

These Remote Workforce Mistakes Are Killing Austin-Based Businesses

These Remote Workforce Mistakes Are Killing Austin-Based Businesses

Austin might be the tech hub of the midwest, but that doesn’t mean that every business is on the same page when it comes to their IT. Cybersecurity has been such a problem recently that it’s close to growing out of control, but Texas CEOs are stuck dealing with louder, more visible issues to the point where they might not be seeing the threats underfoot.

0 Comments
Continue reading

Defining Key Cybersecurity Terms Businesses Should Know

Defining Key Cybersecurity Terms Businesses Should Know

Cybersecurity can be a challenging animal for any business—particularly a small business. That makes it important that you understand a few key terms. Let’s go over these terms as a review—or as an introduction, if that’s the case.

0 Comments
Continue reading

Texas Businesses are Being Targeted by Cybercriminals and Online Threats

Texas Businesses are Being Targeted by Cybercriminals and Online Threats

The United States as a whole has seen a growing wave of cybersecurity threats, and the great state of Texas is no less likely to see these threats. In fact, there are plenty of reasons that Texas would be targeted directly. Let’s briefly review some of these reasons, and how they support the importance of cybersecurity preparedness for Austin businesses.

0 Comments
Continue reading

New Innovations in Manufacturing Lead to Huge Benefits, But Introduce Cybersecurity Risks

New Innovations in Manufacturing Lead to Huge Benefits, But Introduce Cybersecurity Risks

The manufacturing industry has been deeply intertwined with modern technology since the 1950s and 1960s, when computer-aided design (commonly known as CAD) first enabled the digitization of these processes. Today, this interconnectivity has evolved into the Industrial Internet of Things. Let’s consider how these technologies, while greatly beneficial to productivity, have the potential to enable risks… and, critically, how to better resist these risks.

0 Comments
Continue reading

Accounting Firms Need their IT Solutions to Count

Accounting Firms Need their IT Solutions to Count

Most businesses rely on information technology in order to operate, with accountants, CPAs, and accounting firms being no exception. This means that modern accounting firms therefore have a lot of IT-related considerations to manage—particularly related to their security.

0 Comments
Continue reading

How Hackers Steal Your Data (Part 1 of 2)

securityIt’s no secret that your data is a hot commodity. Each day sophisticated cybercriminals attempt to make money by stealing your private information to pose as you, blackmail you, or simply sell your information to someone who will. If you want to stay in business, you’ll need to be able to thwart these attempts. But to do so, you must understand the increasingly advanced methods hackers use. In this two-part article, we’ll examine the techniques hackers are currently employing to gain access to your sensitive data.

Cracking Passwords

The fact that hackers might simply guess your passwords probably seems painfully obvious, but the hard truth is that many companies still lack proper password management. If your password is a series of common words, a dictionary attack can use algorithms to cycle through a word database and quickly discover your chosen phrase.

Simply adding some numbers won’t be enough, either, as hackers can up the ante with a brute force attack which allows them, with some additional computing power, to cycle through alpha-numeric combinations until they strike gold.

And if they are very determined and well equipped, a hacker can also use a rainbow table attack. When passwords are attempted, they are “hashed” to avoid sending the actual plaintext password over the communication line. In this type of attack, pre-computed tables are used to recover these hashes and reverse them to reduce guessing time and discover complex passwords.

To prevent these, you’ll need to create unique passwords that are more than ten characters long and have a mix of numbers, lowercase and uppercase letters, and symbols for each account. One popular trick for this is to think of a phrase and codify it. For example, “Cousin Greg lives in Seattle” becomes “C0u$iNGr3gLiV3SinS3ATtLE”.

Additionally, you should use multi-factor authentication whenever possible so that your password isn’t the only thing standing between an attacker and access to your accounts.

Phishing Schemes

One of the most common methods of data hacking, phishing scams are so effective, they’ve produced many high-profile data breaches including the hacking of Clinton campaign chairman John Podesta, who unknowingly gave up his Gmail password, and Snapchat, where an employee gave up payroll information that led to widespread identity theft.

In a phishing scheme, disguised e-mails are used to lure the recipient into a trap. Posing as a trusted source, such as someone you do business with, your bank, or your email provider, hackers trick you into providing them information directly, clicking a link that leads you to a fake site, or downloading an attachment that then allows them access to your system. One of the oldest tricks in the book, phishing is an evergreen technique that is continually being re-invented in order to become harder to spot.

The best way prevent being hooked in by a phishing scam is to study the way they are being used and stay vigilant. Make sure to check the spelling of URLs in email links and watch out for URL redirects. Keep your browsers up-to-date to ensure you have the most recent security patches and install anti-phishing toolbars on your browser that can run checks on sites you visit and compare them to a database of known phishing sites. And, of course, never give out personal information over email.

These are two of the most popular ways attackers attempt to gain access to your system but stay tuned for Part 2 of this article as we dive into three more sophisticated methods cyber attackers are currently using. Concerned you’re not as safe as you thought? Contact Capstone Works immediately. Our cybersecurity professionals have the expertise to make sure you’re one step ahead of the latest tricks, scams, and hacks that could threaten your business.

0 Comments
Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Central Texas small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

FBI Warns Businesses of Email Scams

The FBI has issued alerts to all businesses about the spread of BEC scams.  One of the fastest growing hazards facing businesses today is the growth of Business Email Compromise or BEC scams.  According to the FBI, these scams have grown by more than 270% since the beginning of last year.  At their last reporting, more than 7,000 businesses have lost more than $1.2 billion in the last 2 years.  At Capstone Works we help you to manage your IT risks.  We are at the forefront of IT risk management; monitoring, assessing and evaluating threats to your network no matter where they may come from.  You can be confident knowing that Capstone Works is in your corner.  While these scams may, at first, seem less impressive than thefts perpetrated by sophisticated malware targeting banks and other large institutions; a BEC attack is, in reality, more vicious.  They are more versatile and can avoid the basic security steps taken by businesses and individuals.  Instead of simply targeting your machines, a BEC scam targets your people!  Criminals are convincing their victims to hand company money right over to them, and they have been very successful in doing so.  According to the FBI, “The scam has been reported in all 50 states and in 79 countries.  Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Latest News & Events

Capstone Works is proud to announce the launch of our new website at https://www.capstoneworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Capstone Works can do for your business.

Call Us Today
Call us today
(512) 882-2242

715 Discovery Blvd
Suite 511

Cedar Park, Texas 78613