Follow Us
248-786-6100   |   Remote Support
blueRock Technologies
  • Home
  • Why BlueRock?
    • Testimonials
    • Partners & Certifications
    • Core Values
  • Services & Solutions
    • IT Managed Services in Michigan
    • IT Project Design and Delivery
      • Virtualization
    • Cloud Services
      • Private Cloud
      • Virtual Desktop (VDI)
      • Hosted Exchange
      • Hosted Servers
  • Industry Solutions
    • Hospitality
    • Healthcare
    • Financial
    • Manufacturing
  • About Us
    • blueRock Services Agreement
    • Contact Us
    • Support Center
    • Blog
    • Careers

Don’t let hackers fool you with these tricks

September 25th, 2018 sdjones Security 2018september25security_a, phishing, pretexting, quid pro quo, rio olympics, Scams, social engineering, tailgating
Don’t let hackers fool you with these tricks

The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although business owners may think that their systems are safe from malware, they may not be prepared for social engineering.

Read more

New Office 365 cyberattack on the loose

August 27th, 2018 sdjones Office 2018august27office_a, cyberattack, Microsoft, Office 365, outlook, phishing, Scams, security, SharePoint
New Office 365 cyberattack on the loose

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users.

Read more

4 Social engineering scams to watch out for

August 18th, 2016 Security 2016august18_security_a, phishing, pretexting, quid pro quo, rio olympics, Scams, social engineering, tailgating
4 Social engineering scams to watch out for

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves -- social engineering.

Read more

Recent Posts

  • A step-by-step guide to building your own PC
  • Essential strategies to defend your VoIP system against TDoS attacks
  • Beyond the basics: Mastering essential Excel features in Microsoft 365
  • How hybrid cloud solutions drive resilience and competitive edge
  • Effective video marketing ideas that elevate and promote your brand

Categories

Archives

Footer_logo

BlueRock Technologies

  • 560 Kirts Blvd
    Suite 122

    Troy, MI 48084
  • Phone: 248-786-6100
  • Fax: 248-786-6101

Follow Us


©2025 blueRock Technologies
All Rights Reserved.
blueRock Services Agreement
  • Privacy Policy
  • Privacy Policy