1.978.662.2041 info@northeast-tech.com

Resources

While organizations invest heavily in stopping threats from entering their networks, a critical vulnerability often goes underprotected: sensitive data leaving the organization through email. ... Read more
Published on: 01-21-2026
A survey by the World Economic Forum (WEF) found that 47% of organizations cite the advancement of adversarial capabilities as their top concern surrounding generative AI. ... Read more
Published on: 01-21-2026
Scammers stole an estimated $17 billion worth of cryptocurrency in 2025, according to a new report from Chainalysis.  Notably, the report found that AI-assisted scams stole 4.5 times more money than scams that didn’t leverage AI. ... Read more
Published on: 01-20-2026
Attackers are increasingly abusing network misconfigurations to send spoofed phishing emails, according to researchers at Microsoft. This technique isn’t new, but Microsoft has observed a surge in these attacks since May 2025. ... Read more
Published on: 01-15-2026
Microsoft was the most commonly impersonated brand in phishing attacks during the fourth quarter of 2025, according to researchers at Guardio. Microsoft was followed by Facebook, Roblox, McAfee, Steam, AT&T, Amazon, Google, Yahoo, and Coinbase. ... Read more
Published on: 01-14-2026
Researchers at RavenMail warn that a major phishing campaign targeted more than 3,000 organizations last month, primarily in the manufacturing industry. ... Read more
Published on: 01-14-2026
WIRED reports that deepfake attacks are impersonating pastors and other religious figures in order to scam congregations. ... Read more
Published on: 01-13-2026
ClickFix attacks have been around for decades; only the name is new. ClickFix attacks use social engineering to trick users into clicking on buttons and links that the user is told are needed so their browser or computer can perform some desired action. ... Read more
Published on: 01-09-2026
Researchers at Gen warn that a phishing campaign is attempting to trick users into linking malicious devices to their WhatsApp accounts. ... Read more
Published on: 01-08-2026
Email has been the backbone of business communication for decades and as such, it remains the attacker’s favorite doorway into an organization. ... Read more
Published on: 01-08-2026
The North Korean threat actor “Kimsuky” is using QR codes to trick users into installing malicious mobile apps, according to security researchers at ENKI. The phishing sites, which impersonate delivery services, inform users that the webpage cannot be viewed on a desktop. ... Read more
Published on: 01-07-2026
In the early hours following reports of a U.S. military operation involving Venezuela, social media feeds were flooded with dramatic images and videos that appeared to show the capture of Venezuelan president Nicolás Maduro. Within minutes, AI-generated photos of Maduro being escorted by U.S. law enforcement, scenes of missiles striking... Read more
Published on: 01-06-2026
In the fast-paced world of managed services, where margins are tight and competition is fierce, it's no secret that Managed Service Providers (MSPs) are inherently price-sensitive. Every decision, from tool selection to vendor partnerships, is scrutinized through the lens of cost-efficiency. Email security is a prime example of this dynamic.... Read more
Published on: 08-27-2025
Phishing attacks are becoming more sophisticated and certainly more costly. Take Business Email Compromise (BEC), for example. In 2024, the average BEC came with a loss of more than $137,000 – a pretty hefty sum for a business to absorb.1 As Managed Service Providers (MSPs), your clients rely on you... Read more
Published on: 08-07-2025
Setting up email security for multiple teams or clients can feel like a daunting task, especially for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), or large organizations. Fortunately, INKY’s client install process makes this a breeze by leveraging global settings and an intuitive inheritance system. In this blog... Read more
Published on: 07-23-2025
One of the most recognizable—and powerful—features of INKY has always been our banners. Clean, clear, and color-coded, INKY banners turn complex security signals into an intuitive, user-friendly experience. For years, they've empowered users to instantly understand whether an email is safe, suspicious, or dangerous without needing to be a cybersecurity... Read more
Published on: 07-01-2025
“Looks can be deceiving” is a lesson most of us learn the hard way. It’s the stunning wedding photos that feature bridezilla. Or, taking a big gulp of milk, only to discover it’s spoiled. You get the picture. Unfortunately, far too many companies are learning about malicious QR codes the... Read more
Published on: 06-18-2025
A Milestone Year for a Growing Threat 2024 marked the 25th anniversary of the FBI’s Internet Crime Complaint Center (IC3) and while their efforts are worthy of celebration, those on the receiving end of cybercrime in 2024 had little to celebrate. The latest annual report paints a sobering picture, as... Read more
Published on: 05-21-2025
If you’ve ever played Jenga, you’re familiar with just how carefully you must work to build something stable. If you remove the wrong piece or add a new layer too quickly, things can get very wobbly. Building your Managed Service Provider (MSP) business isn’t very different. Every new customer, every... Read more
Published on: 05-08-2025
Before we get to the article, we could use your input on a new promotion. What if you could earn cash by simply sharing INKY blog posts with your friends and colleagues? Receive a $5 reward for each shared post, payable every time you accumulate $50 in rewards. Sounds easy,... Read more
Published on: 04-24-2025
Under the current administration, the United States has experienced significant shifts in immigration and deportation policies. In fact, Homeland Security officials said that Immigration and Customs Enforcement (ICE) carried out more than 32,000 arrests in the first 50 days of the new administration.1 The deportation efforts have individuals, families, and... Read more
Published on: 04-15-2025
Staying informed is the first line of defense when you’re a Managed Service Provider (MSP), protecting your customers from email security threats. To help you stay ahead of that curve, we’re happy to share INKY’s 2024-2025 Email Security Annual Report. Let's dive into some of the key insights that will... Read more
Published on: 03-25-2025
The rapid explosion of Artificial Intelligence (AI) has permeated nearly every industry across the globe. For those of us in email security, AI brings both positive and negative ramifications. When used for good, AI is an incredible tool in the never-ending battle against phishing attacks. However, over on the evil... Read more
Published on: 01-30-2025
In a significant milestone for global cybersecurity, the United Nations General Assembly has adopted a new, legally binding treaty on cybercrime. This treaty, known as the United Nations Convention against Cybercrime, represents a crucial step in the ongoing battle against digital threats. With cybercrime affecting over two-thirds of the global... Read more
Published on: 01-09-2025
As a Managed Service Provider (MSP), your days are filled with a myriad of tasks, from monitoring client systems to resolving complex IT issues. But what if you could find more time in your day to take on new customers and expand your business? We’d like to share four tips... Read more
Published on: 12-05-2024
Cyber Monday sales are expected to hit a record $13.2 billion on Monday, which is 6.1% more than in 2023.1 While this is great for online retailers, it’s important to remember that cybercriminals are just as excited as you are about the holiday rush. ... Read more
Published on: 12-02-2024
When Telegram CEO, Pavel Durov, was arrested in August of 2024 it put the spotlight on the criminal use of third-party platforms. The arrest came because of what officials believed to be a lack of moderation and cooperation from Telegram in fighting crimes against children. While crimes of this nature... Read more
Published on: 11-15-2024
Page Visitors