Crown Logo

Technology Support For San Diego Since 1996

Click here for 60 minute consultation858-483-8770
Don’t Fall for the Clickbait!

Don’t Fall for the Clickbait!

Most scams are based off age-old methods of deception. Impersonation, fraud, and unauthorized access are all their own flavor of deception, but (strangely enough) one of the most classic forms of deception might also be the newest: clickbait. Today, we’ll tell you one...
A Behind-the-Scenes Look at DMARC Email Security

A Behind-the-Scenes Look at DMARC Email Security

Did you know that phishing attacks are by far the most popular way for attackers to steal information from and defraud small- and medium-sized businesses? Many of the most damaging attacks start with unsolicited emails. When it comes to whether something is legitimate...
What’s Different about the Recent LibWebP Vulnerability?

What’s Different about the Recent LibWebP Vulnerability?

Every so often a software vulnerability pops up and reminds us that security can’t be a set-it-and-forget-it kind of job. As technology outlets spread the news about a new vulnerability last week, the response is mostly the same as it always is: patch and update your...
Saying Goodbye to Active Directory and Hello to Entra ID?

Saying Goodbye to Active Directory and Hello to Entra ID?

Back in July, Microsoft announced that Azure Active Directory would become Entra ID. While the change was mostly just a rebranding, it still sparks the question: is Microsoft moving on from Active Directory? And should your business move on too? It’s an interesting...
How to Detect Phishing Emails: 8 Ways to Keep Your Data Safe

How to Detect Phishing Emails: 8 Ways to Keep Your Data Safe

Introduction Common cyberthreats like phishing emails can have catastrophic effects, including identity theft, financial loss, and stolen data. These emails frequently trick users into submitting sensitive information like passwords, credit card numbers, and other...