Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Huawei’s Horrible, No Good, Very Bad Week

Huawei’s Horrible, No Good, Very Bad Week

Make no mistake about it, Huawei is one of the largest technology companies in the entire world. It employs over 200,000 people and in 2018 saw revenues of over $100 billion. Over the past few years, their devices have been pushing the boundaries of what is possible in tech, all while being relatively unavailable to one of the major technology markets in the world, the United States. The fact is that, outside the U.S., Huawei is a major player.

0 Comments
Continue reading

The Top 5 Smartphones For You Heading Into 2019

The Top 5 Smartphones For You Heading Into 2019

With the smartphone market losing ground for the first time in its short history, many of the manufacturers you’ve come to know are either non-factors in the current market, or don’t even produce smartphones anymore. With new demand growing every year, new manufacturers such as OnePlus and Xiaomi are primed to fall in line behind Samsung and Apple.

0 Comments
Continue reading

Tech Term: Mobile Device Management

Tech Term: Mobile Device Management

While smartphones and tablets can be so helpful, the technology can also interfere with business success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save considerable time and resources on device procurement. You certainly want to make sure you have a mobile device management policy put in place, first.

0 Comments
Continue reading

Have Any of These New Phones Made It on to Your Wish List?

Have Any of These New Phones Made It on to Your Wish List?

The new smartphone models are here. This year there are plenty for consumers to get excited about in the smartphone space. The return of the Galaxy Note, the evolution of the Galaxy s8, a premium iPhone, and the return of two industry heavy hitters, highlight this year’s best smartphones.

0 Comments
Continue reading

Why Hasn’t Mobile Payment Really Taken Off?

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you click on the included link, that actually results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.


What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, then you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, then reach out to confirm that the message truly came from the sender. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know, especially when the number is a 5000 number. This indicates that the message was an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with these practices.

CTN Solutions can help you to put these safeguards, and others, in place for your business devices. Give us a call at (610) 828-5500 to get started.

0 Comments
Continue reading

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

0 Comments
Continue reading

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

0 Comments
Continue reading

Smartphones Call For Smart Security

b2ap3_thumbnail_smartphone_security_400.jpgWe always talk about protecting your computers and servers from outside threats, but what about protecting your smartphones? There isn’t much difference between a smartphone and a computer. They both function in very similar ways with access to a variety of apps, social media, and browsers. Your smartphone could hold much more valuable data than just contacts or text messages.

0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

Drew was pleased to present a gift of financial assistance to the Joy of Life program in Sarajevo, Bosnia on behalf of his non-profit ABLE (American Balkan Leadership Enterprise) and my company CTN Solutions. Unfortunately in many countries...

Latest Blog

Whether it’s RFID sensors, mobile devices, or commercial goods, the Internet of Things (IOT) is an exponentially expanding industry. Which makes us think, “What can we expect in the near future for IOT?” Today, we will answer this very ques...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422