About Mihai
This author has yet to write their bio.Meanwhile lets just say that we are proud Mihai contributed a whooping 134 entries.
Entries by Mihai
Trending Social Media Scams
November 11, 2025 /2 Comments/in IT Security /by MihaiSocial media has become an essential part of our daily routine. A 2025 GWI research reveals that a typical user spends on average 2 hours and 21 minutes daily on social media while 63.9% of the world’s population uses social media platforms. From staying in touch with friends and colleagues to following the latest news, […]
Beware of Phishing
September 10, 2025 in IT Security, Tech Tips /by MihaiIn recent weeks, we have seen a huge increase in hostile activities, especially phishing, spear phishing, whaling, email phishing, clone phishing, so we decided to take a step forward and show our readers how to spot such attempts, the latest hacking methods, tools, etc. File Sharing Applications Cybercriminals will often share a malicious link to […]
StratusPointIT ranks #56 on the 2025 CRN Fast Growth 150 list
August 29, 2025 in News /by MihaiWhaling Attacks: Overview
August 26, 2025 in IT Security, Tech Tips /by MihaiSimply put, whaling is a sort of phishing attack that targets high-profile employees, such as managers, directors, C-suite positions, etc. The term “whaling” reflects the target of the attack, the “whale”, basically individuals who hold significant authority and high-level access to sensitive information. Unlike traditional phishing attacks that target the average person, whaling is a […]
Credential Stuffing: Overview
July 29, 2025 in IT Security, Tech Tips /by MihaiCredential stuffing is a very common type of cyberattack where cybercriminals use lists of stolen credentials, usually obtained from previous data breaches, attempting to access different accounts/websites. Once logged in, hackers will take over the account. How Credential Stuffing Works Firstly, hackers gather lists of usernames and passwords stolen in data breaches or buy them […]
The Zero Trust Security Framework
June 24, 2025 in IT Security, Tech Tips /by MihaiAs organizations continue to embrace flexible/remote work, a comprehensive approach to IT security is more than necessary, it is crucial. The Zero Trust security works on a basic principle: never trust, always verify. So, regardless of the user, device, or application, Zero Trust security ensures every access request is carefully verified. Zero Trust & Data […]
Privileged Access Management: Best Practices
June 10, 2025 in IT Security, Tech Tips /by MihaiThe more privileges a user or an app gets, the greater the potential for abuse or error. Implementing privileged access management (PAM) provides several benefits, including a smaller attack surface, which is easier to protect against internal and external threats. In simple terms, one of the most direct ways to implement Privileged Access Management is […]
Security Misconfiguration: Overview
May 27, 2025 in IT Security /by MihaiWith the move to the cloud and reliance on third-party solutions, one important vulnerability often occurs: security misconfiguration. The impact of security misconfigurations can be disastrous, but with proper precautions and cybersecurity, they can be prevented. Security misconfiguration represents any error or vulnerability in the setup of any system organizations rely on. There are many […]
Windows 10: End of Support
April 29, 2025 in IT Security, IT support /by MihaiMicrosoft have recently stated that support for Windows 10 will end on October 14, 2025. If you are still using Windows 10 after this date, your services will not stop, but Microsoft will no longer provide Windows 10 updates and free security patches. Note: Version 22H2 will be the last version of Microsoft Windows 10. […]
