top of page
6939283_3422326.jpg

Search Results

55 results found with an empty search

Blog Posts (34)

  • Prompts From the End of Time

    It was a good run The End of The World, John Martin, c.1851-53   As the world hurtles toward climatologic and ecologic catastrophe, with many of its nations’ leaders concluding that hitting the accelerator on capitalism’s infinite growth mandate is the best course of action, let’s take a step back and examine the single greatest technological menace to life on Earth. We’ve covered enshittification before, and it shows no signs of abating or reversing course. Generative AI, however, is not merely a byproduct of enshittification: it actively foments and enshittifies by its very nature. Artificial intelligence has become the primary growth engine of the American economy. Harvard economist Jason Furman claims 92% of GDP growth from the first half of 2025  is attributable to AI investment. While the idea that a massively overhyped, still unproven technology underpins the majority of our economic growth is disturbing, the series of events harkens back to the dotcom bubble of the late ‘90s . The parallels are eerie: massive, cross-industry investments; ceaseless marketing and integration of AI features into almost every tech product we use; eye-watering valuations of AI companies that haven’t turned a profit yet . There is no shortage of analysts  who don’t believe AI companies even have a path to profitability. The desperately absurd energy requirements and carbon footprints of new AI datacenters  likewise puzzle and horrify: OpenAI recently struck a deal with Broadcom to develop 10 gigawatts of additional AI datacenter capacity, roughly the energy usage of a large American city. Naturally, AI’s purveyors see nothing but upside here. Additional capacity will enable amazing, incredible features that make your life as a faceless consumer of AI slop better. And, most critically, additional investment will make early investors in AI companies like OpenAI and Anthropic even richer. That’s the headline here, in case you missed it. Sam Altman himself, CEO of OpenAI, is never very long on detail when it comes to just how  AI will change the world, or how it will do so in a sustainable or ethical way, but he’s sure it will. Never mind that his company’s flagship product only exists because of large-scale theft  of creative works produced by actual human beings. And don’t pay any attention to the fact that the world’s largest insurance companies can’t insure the likes of OpenAI because the scale of potential (and pending) legal claims against those companies is so grand.   Meanwhile, Elon Musk’s ever-hallucinatory, increasingly racist and Fascist AI model, Grok, now runs on new xAI datacenter infrastructure in Memphis, Tennessee where its nitrogen oxide (NOx) emissions are estimated at 1200 to 2000 tons per year—vastly higher than neighboring fossil-fuel-powered interests. The xAI datacenter is located in an area of South Memphis already known for its high smog levels and state-leading asthma hospitalizations. Politico reports : The turbines are only temporary and don’t require federal permits for their emissions of NOx and other hazardous air pollutants like formaldehyde, xAI’s environmental consultant, Shannon Lynn, said during a webinar hosted by the Memphis Chamber of Commerce. The argument appears to rely on a loophole in federal regulations that environmental groups and former EPA officials say shouldn’t apply to the situation.   Given Elon Musk’s hot-and-cold relationship with current President and convicted felon Donald J. Trump, it may not be too surprising that the xAI datacenter in Memphis retains carte blanche to pollute with impunity, ignoring federal regulations and the Clean Air Act in the process. EPA Administrator Lee Zeldin has championed the deregulation  of environmental protection standards, claiming the agency’s goal is now: “driving a dagger straight into the heart of the climate change religion to drive down cost of living for American families, unleash American energy, bring auto jobs back to the U.S. and more,” This hand-in-glove arrangement between the current regime in Washington and the AI-focused companies who have so generously supported them comes at a time when political capital should be spent on driving down emissions, not increasing them. Of course, Sam Altman and Elon Musk’s goals, and the goals of the AI ouroboros, are incompatible with such ‘strict’ emissions standards; if tech continues to have its way, we will likely only see emissions targets further reduced. I appreciate that this topic is fraught and politically charged; AI is being deployed at a scale that precious few had any inkling of even five years ago. But this is rather the point: the longer we refuse to confront the deep interrelations between AI, policy, and our own environment, the closer we walk to cataclysm. Granted, this isn't the bubbly, "I support technological advancement at literally any cost" pseudo ad copy you'll read elsewhere on the Internet, but I don't have affiliate links and I don't make money from lying to you. Generative AI’s growth is unsustainable; its promises are largely unfulfilled; our economy’s dependence on its success leaves us open to existential threats to our current way of life; the politics encouraging the AI bubble are diametrically opposed to the politics needed for a habitable planet; the privacy and safety implications of AI models without actual guardrails are dystopian; AI as a tool can and will be used by hostile governments to identify and punish dissenters. For all its potential, AI is a loaded gun and those most prominently and publicly championing its rapid adoption are confidence-men at best, and deeply malicious, narcissistic grifters at worst.

  • Business Email Compromise Attack Volume Increased 37% Between May 2024 and June 2025 – Is Your Business at Risk?

    Cybercriminals aren’t slowing down; they’re getting smarter. A recent industry report found that Business Email Compromise (BEC) attacks surged by 37% in just over a year, from May 2024 to June 2025. That’s not a small uptick: that’s a sign that attackers are finding success and doubling down. If your business relies on email to communicate with clients, vendors, or employees (and whose doesn’t?), this is a wake-up call. BEC attacks are not your typical phishing scams. They don’t rely on mass spam campaigns or clumsy one-off emails. Instead, they involve highly targeted, socially engineered attacks designed to trick your team into transferring money, sharing sensitive data, or revealing login credentials. Think of them as cyber-fraud mixed with impersonation: attackers often compromise or spoof a real mailbox and then send what appears to be a legitimate email--sometimes even from a known executive. Why the surge? The answer lies in attackers’ return on investment. Unlike ransomware, which is noisy and risks triggering incident response, BEC is relatively quiet. It requires little to no malware – meaning it often evades traditional antivirus or endpoint security tools. Attackers have figured out that manipulating human trust yields faster payouts with fewer technical hurdles.     Small and mid-sized businesses are particularly vulnerable. Many don’t have advanced threat protection enabled, don’t enforce multi-factor authentication on email accounts, and don’t have a formal process for verifying financial transactions. A single successful BEC can cost tens of thousands of dollars – not just in stolen funds, but in downtime, incident response, and potential reputational harm. The FBI’s IC3 report consistently ranks BEC as the #1 costliest cybercrime year after year. 📊 Quick Stats: Business Email Compromise at a Glance Average loss per BEC incident:  $125,000+ SMBs targeted in past 12 months:  43% Total reported losses (2024):  $2.9 billion+ Attack entry points: 75% via spoofing or account takeover Prevention potential:  90% could be stopped with better verification processes   The good news: BEC is preventable. A combination of technical controls and staff awareness training dramatically lowers risk. At minimum, businesses should enforce multi-factor authentication across all email accounts, enable advanced phishing protection in Microsoft 365 or Google Workspace, and create a clear “out-of-band” process for approving wire transfers or banking changes. This means no payment should be authorized solely based on an email. Security awareness training is another critical layer. Employees should learn to spot red flags such as urgent requests, unusual banking details, or slightly altered email domains. Simulated phishing campaigns can test your team’s readiness and help identify users who may need extra coaching. The human layer is often the last line of defense – strengthening it pays dividends. Monitoring and response are also crucial. Your IT partner should review sign-in logs for what Microsoft calls “impossible travel” (signing in from physically disparate locations within impossible timeframes) or suspicious activity, setting conditional access policies, and alerting on forwarding rules that may have been maliciously configured. This proactive monitoring ensures that if an account is compromised, you can respond before the attackers cash out. At Geeks for Business, we help businesses implement a layered security approach that includes advanced email protection, identity security, and user training. If this increase in BEC attacks concerns you, you’re not alone, and you don’t have to face the threat alone. Schedule a security consultation with our team today and let’s make sure your business doesn’t become the next statistic. Real-World BEC Examples and Lessons Learned   Case Study 1:  A manufacturing firm lost $240,000 after an attacker gained access to the CEO’s mailbox and sent realistic-looking wire transfer requests. The funds were sent overseas before IT discovered the compromise. Case Study 2:  A California CPA firm suffered a $90,000 loss when a vendor's email account was spoofed. The fake invoice matched previous formatting and was paid without question. The firm later had to cover client losses out of pocket. Case Study 3:  A healthcare provider narrowly avoided a $300,000 loss thanks to a vigilant employee who noticed a slightly altered email domain. The event still cost $25,000 in forensics and recovery efforts.   Case Study 4:  A boutique software development firm in Europe lost approximately $285,000 to wire fraud as a result of BEC. The attacker gained access to the company’s Microsoft tenant via the widely deployed Evilginx phishing toolkit and began reconnaissance and information-gathering. Three months later, the attacker began intercepting and redirecting emails between company executives, a third-party organization, and the company’s internal finance department. The accountant mistook a fraudulent wire request for a legitimate email and mistakenly paid out a large sum of money to the attacker. Unfortunately, the funds were not recovered.  The average costs of one instance of Business Email Compromise Direct Financial Loss $50,000 - $250,000+ per incident Incident Response & Forensics $10,000 - $50,000 Legal & Compliance Fees $5,000 - $20,000 Downtime/Lost Productivity Hundreds of staff-hours Reputational Damage Loss of client trust, potential churn At Geeks for Business, we help organizations implement multi-layered defenses, continuous monitoring, and employee training to stop BEC before it impacts your bottom line. Request your free security posture review today.

  • Beware of these emerging cyberthreats in 2024

    The global cost of a data breach last year was $4.45 million . This is an increase of 15% in three years. As we step into 2024, it's critical to be aware of emerging technology threats--threats that could potentially disrupt and harm your business. Technology is evolving at a rapid pace. It’s bringing new opportunities and challenges for businesses and individuals alike. Rapid developments in artificial intelligence (AI), machine learning (ML), and quantum computing are leading companies across all industries to radically reconsider their approach to cybersecurity and systems management. While these technologies are poised to make our lives easier, they're also being used to launch sophisticated, large-scale attacks against the networks and devices we depend on. In this article, we’ll highlight some emerging technology threats to be aware of in 2024 and beyond. Data Poisoning Attacks Data poisoning involves corrupting datasets used to train AI models. By injecting malicious data, attackers can skew algorithms' outcomes. This could lead to incorrect decisions in critical sectors like healthcare or finance. Some actions are vital in countering this insidious threat. These include protecting training data integrity and implementing robust validation mechanisms. Businesses should use AI-generated data cautiously. It should be heavily augmented by human intelligence and data from other sources. 5G Network Vulnerabilities The widespread adoption of 5G technology introduces new attack surfaces. With an increased number of connected devices, the attack vector broadens. IoT devices, reliant on 5G networks, might become targets for cyberattacks. Securing these devices and implementing strong network protocols is imperative. Especially to prevent large-scale attacks. Ensure your business has a robust mobile device management strategy. Mobile is taking over much of the workload Organizations should properly track and manage how these devices access business data. Quantum Computing Vulnerabilities Quantum computing, the herald of unprecedented computational power, also poses a threat. Its immense processing capabilities could crack currently secure encryption methods. Hackers might exploit this power to access sensitive data. This emphasizes the need for quantum-resistant encryption techniques to safeguard digital information. Artificial Intelligence (AI) Manipulation AI, while transformative, can (and is) being used to facilitate the spread of misinformation. Cyber criminals are already creating convincing deepfakes with AI, and automating phishing attacks. Vigilance is essential as AI-driven threats become more sophisticated. It demands robust detection mechanisms to discern genuine from malicious AI-generated content. Regulatory bodies and watchdog groups have proposed mandatory watermarks for AI generated content to make it easily discernible from human-generated (or human-reviewed) content. Augmented Reality (AR) and Virtual Reality (VR) Exploits AR and VR technologies offer immersive experiences. But they also present new vulnerabilities. Cybercriminals might exploit these platforms to deceive users, leading to real-world consequences.  Ensuring the security of AR and VR applications is crucial. Especially to prevent user manipulation and privacy breaches. This is very true in sectors like gaming, education, and healthcare. Ransomware Evolves Ransomware attacks have evolved beyond simple data encryption. Threat actors now use double extortion tactics. They steal sensitive data before encrypting files. If victims refuse to pay, hackers leak or sell this data, causing reputational damage.   Some defenses against this evolved ransomware threat include: Robust backup solutions Regular cybersecurity training Proactive threat hunting  Supply Chain Attacks Persist Supply chain attacks remain a persistent threat. Cybercriminals infiltrate third-party vendors or software providers to compromise larger targets. Strengthening supply chain cybersecurity is critical in preventing cascading cyber incidents. Businesses can do this through rigorous vendor assessments, multi-factor authentication, and continuous monitoring. Biometric Data Vulnerability Biometric authentication methods, such as fingerprint or facial recognition, are becoming commonplace. But users can't change biometric data once compromised, like they can passwords. Protect biometric data through secure encryption. Ensure that service providers follow strict privacy regulations. These are paramount to preventing identity theft and fraud. Advanced Phishing Attacks Phishing attacks are one of the oldest and most common forms of cyberattacks. These attacks are becoming more sophisticated and targeted thanks to AI. For example, hackers customize spear phishing attacks to a specific individual or organization. Hackers do this based on online personal or professional information. Another example is vishing attacks. These use voice calls or voice assistants to impersonate legitimate entities, convincingly persuading victims to take certain actions. Ongoing employee phishing training is vital, as well as automated solutions to detect and defend against phishing threats. At Geeks for Business, we believe that a proactive approach to cybersecurity is critical. With our trusted cybersecurity partner, Huntress, we are able to hunt for threats within networks before they become breaches. With complexity in cyberattacks rising, reacting to an attack just isn't enough; our 24/7 managed endpoint detection and response approach allows us to go on the offense against prospective cyber criminals. Tips for Defending Against These Threats As technology evolves, so do the threats that we face. Thus, it’s important to be vigilant and proactive. Here are some tips that can help: Educate yourself and others about the latest technology threats. Use strong passwords and multi-factor authentication for all online accounts. Update your software and devices regularly to fix any security vulnerabilities. Avoid clicking on suspicious links or attachments in emails or messages. Verify the identity and legitimacy of any callers or senders. Do this before providing any information or taking any actions. Back up your data regularly to prevent data loss in case of a cyberattack. Invest in a reliable cyber insurance policy. One that covers your specific needs and risks. Report any suspicious or malicious activity to the relevant authorities. Need Help Ensuring Your Cybersecurity is Ready for 2024? Last year’s solutions might not be enough to protect against this year’s threats.  Don’t leave your security at risk. We help small and medium businesses throughout Central North Carolina manage their IT, reduce costs and complexity, expose vulnerabilities, and secure critical business assets. Reach out to Geeks for Business today to schedule a chat. Article used with permission from The Technology Press.

View All

Other Pages (21)

  • Managed Support - Geeks for Business

    Geeks for Business provides managed helpdesk, remote IT support, employee training, and technical onboarding for your company Consulting, Strategy & Support IT Consulting Whether you already run an IT department or work with another company for aspects of your existing IT systems, Geeks for Business can add value to your IT processes, reduce costs, and simplify technology stacks. Remote Support Tech emergency that doesn't require an onsite visit? We've got you covered. Using remote support software, Geeks for Business can connect to your device over the Internet to diagnose and resolve issues, no matter where you are. Customers who opt for our comprehensive managed IT plans enjoy 24x7x365 device monitoring and proactive support. Benefits of remote support Saving you the additional time and expense of an onsite visit. Geeks for Business engineers its managed IT service portfolio specifically to minimize disruptive onsite tech work. While some onsite work is inevitable, modern remote management and automation tools make fixing many issues fast, with no site work necessary. Resource Planning Reach out to Geeks for Business for a free 30-minute consultation. We'll review aspects of your current IT setup, such as total spending, resource availability, provider reliability, and budget in order to provide you with a plan to reach your IT goals. Our areas of expertise Hardware strategy and procurement Docker and Kubernetes Cloud technology solutions (including cloud-to-multicloud integration) Next-gen cybersecurity and 24/7 threat hunting Systems architecture, including high availability API and integration work Internal app security and management Remote work solutions (VDI) For managed IT clients Our remote support platform additionally enables us to proactively monitor your IT environment and solve issues before they become problems that interrupt your business's operations.

  • Industries - Geeks for Business

    Learn about the industries and business segments Geeks for Business serves. Industries we serve Agriculture Small farms, garden centers, and agricultural supply stores can reduce costs and improve operational efficiency with managed IT. Geeks for Business can empower your agricultural business with powerful, focused IT solutions. Finance and Legal Whether you're a self-employed CPA, a PLLC, or a community bank, you need an IT solution that considers your and your clients' safety. With comprehensive endpoint security and proactive threat hunting, as well as secure, tested data backups and Identity and Access Management, Geeks for Business provides a full-stack managed IT solution with operational security most in mind. Education Daycare, charter, or private school? Our managed service plans can help you more effectively track, manage, and monitor educational assets; isolate and secure network devices; provide comprehensive network printing management; and implement continuous, proactive threat monitoring to ensure the safety of students and staff alike. Energy & Utilities Companies in the utilities and energy sector are more prone to cyberattacks than ever, with significant consequences to public safety. Geeks for Business is equipped to provide critical cybersecurity services, including continuous vulnerability scanning and threat hunting, to ensure that your energy provider meets compliance and regulatory standards. Manufacturing Improve uptime, reduce ongoing IT labor costs, and increase organizational productivity with Geeks for Business. We know the technology needs of manufacturing companies can be complex, and security can be challenging when managing legacy systems. We're proud to work with a diverse array of manufacturers in the Triangle and we have a deep understanding of the unique IT challenges manufacturers face. Let us help you streamline your business processes with a managed IT solution designed for your company.

  • Managed Security - Geeks for Business

    Geeks for Business provides a comprehensive endpoint and identity security platform to keep your business up and running. Cybersecurity Managed Detection and Response (EDR, MDR, XDR) Ransomware costs the average small company a staggering $713,000, according to a report from Tech Transformers. Only around 1 in 5 small to medium sized businesses are confident in their IT security strategies. Cybersecurity is challenging and expensive to implement and maintain for business owners, especially as threats grow more sophisticated. Our experience in preventing and remediating security threats can help you spend less time worrying about managing your small business's IT security. Secure Networking Modern networks carry more traffic than ever. HIPAA and PCI compliance add more layers of complexity to your network. Are you prepared for an Internet outage with an Internet failover solution? A relatively small investment in a backup Internet solution will pay dividends during future ISP outages. We ensure your network is secure, standards-compliant, and redundant. We monitor and update your network infrastructure, giving you insights into bandwidth usage, downtime, and network performance, all for a predictable monthly rate. Secure data backup The amount of data the world generates each year is vast. According to Statista, by 2025 the world will create, capture, copy, or consume 125 zettabytes of data. That's roughly 114 *billion* terabytes of data, or enough to fill 5.7 billion 20TB hard drives. As hard drives increase in capacity, so, too, do the chances of an unrecoverable error. Malware, hardware failures, and incomplete data backups don't have to leave you in the lurch. Geeks for Business provides ongoing, proactive data security for you and your business. We combine on-premises with cloud storage to give you resiliency, in addition to offering up to hourly snapshots of your data. Combined with our managed security plan, you can rest assured your critical data is safe. IAM, PAM, and Zero Trust Geeks for Business offers comprehensive solutions for IAM (Identity and Access Management), PAM (privileged access management), authentication, and Zero-Trust access management. The rapidly evolving IT security landscape demands centralized management of users, identities, and assets. No more manually updating user passwords, scrambling to revoke credentials when an employee leaves your company, trying to get a clear picture of who has access to what within your business. Geeks for Business provides trusted security, PAM (privileged access management), Zero-Trust, and privilege management for your company, making life easier for you and your employees while keeping your business data safe.

View All
bottom of page