SMBs Are Underestimating Their Cyber Risk

constructure technologies SMBs Are Underestimating Their Cyber Risk

A new survey from ASUS reveals a worrying trend among small and mid-sized business leaders: 84% feel “safe or neutral” about cyber threats, even though 16% have already experienced a cyberattack. (PR Newswire) At a time when cyberattacks against SMBs are doubling year over year, that sense of security may be misplaced. For Constructure Technologies, the findings reinforce what their … Read More

SonicWall Cloud Backup Breach Affects All Customers

constructure technologies SonicWall Cloud Backup Breach Affects All Customers

When your security vendor gets breached, it’s more than a headline—it’s a warning. SonicWall has confirmed that every MySonicWall cloud backup customer was impacted by a recent cyber incident, exposing sensitive firewall configuration files, VPN settings, and encrypted credentials. The full story, first reported by TechRadar, highlights how even trusted providers can become weak links in your cybersecurity chain. What … Read More

Ransomware Attacks Are Hitting Mid-Sized Companies Hardest in 2025

constructure technologies Ransomware Attacks Are Hitting Mid-Sized Companies Hardest in 2025

In the first half of 2025, ransomware attacks surged by nearly 50 % compared to the same period in 2024, with attackers posting 4,198 victims to leak sites between January and June. Mid‑sized companies—those with 51–200 staff members and $5M–$25M in revenue—were the most severely impacted. For organizations in this “middle market” segment, the threat has never been more urgent. Lean … Read More

Geopolitical Tensions Are Raising Cyber Threat Levels for Businesses

constructure technologies Geopolitical Tensions Are Raising Cyber Threat Levels for Businesses

Rising global tensions are now spilling into cyberspace. In recent months, U.S. officials have warned businesses to prepare for potential cyber retaliation tied to international conflicts, with particular concern about state-linked actors from Iran.  Experts caution that attacks aimed at one entity or region can easily ripple across borders, affecting companies far outside the immediate conflict zone  Constructure Technologies is … Read More

Google Workspace Security Best Practices Every Business Should Know

constructure technologies google workspace security best practices

Small businesses use Google Workspace because it’s simple, scalable, and cost-effective. But default settings aren’t enough to keep your data safe. If your company relies on Gmail, Google Drive, or shared Docs, you need more than just a strong password. Cyberattackers know that small and mid-sized businesses often skip deeper security settings. That’s why they’re a growing target. Here’s how … Read More

New Flaw in Google Gemini Could Trick Users Into Phishing Scams

New Flaw in Google Gemini Could Trick Users Into Phishing Scams

Cyberattackers have found a new way to exploit Google’s Gemini AI tool. It could leave your business exposed if your team relies on AI for email communications. A recently disclosed vulnerability shows how hackers can hide secret instructions in emails that trick Gemini into generating fake summaries with phishing messages. For business owners, it’s another reminder that cyber threats keep … Read More

Homeland Security Bulletin Warns of Rising Cyberattack Risks Linked to Iran Conflict

constructure technologies cybersecurity news

Homeland Security recently issued a new security bulletin, warning of elevated cyberattack threats tied to escalating tensions in the Middle East. While large organizations are often seen as the main targets, small and mid-sized businesses are just as vulnerable—especially those with remote access systems or minimal cybersecurity protections in place. For business owners in today’s digital world, the message is … Read More

AI Data Risks Are Rising

AI Data Risks Are Rising

What the Varonis Report Means for Your Business Artificial intelligence is revolutionizing how companies work—but it’s also reshaping how hackers attack. According to the newly released 2025 Varonis State of Data Security Report, AI is exposing sensitive business data faster and more dangerously than ever before. Based on a review of 1,000 real-world environments, the report makes one thing clear: … Read More

Password Spray Attack Exposes Cloud Security Risks

password spray attack

Hackers are stepping up their game—again. On April 29, 2025, Microsoft confirmed a widespread password spraying attack carried out by a hacking group known as Storm-1977.  The campaign specifically targeted cloud tenants in the education sector, using stolen credentials and automation tools to break into containerized environments and launch cryptomining operations. This blog breaks down what happened, how these attacks … Read More

Beware of “Smishing” Attacks on Android and iPhone Users

Constructure Technologies - Smishing Attacks - CyberSecurity

Hackers are ramping up their efforts to steal personal and financial data through smishing—a growing cyber threat that targets smartphone users. A recent nationwide warning was issued about a surge in smishing attacks affecting both iPhone and Android users. With over 10,000 fraudulent domains registered to support these scams, phone users are tricked into revealing sensitive data through fake text … Read More