Phishing Claiming a Google Subpoena

Phishing Claiming a Google Subpoena

Published on: 18/03/2026

A phishing scam claims Google received a subpoena tied to your email. Learn how to recognize the scam and protect your account using simple steps: stop, verify, report, and secure.

Cybersecurity
How the Lost Phone Scam Works

How the Lost Phone Scam Works

Published on: 11/03/2026

A simple text saying “Hi Mom, I lost my phone” can be part of a growing impersonation scam. Learn how this SMS fraud works and the simple steps families can take to verify messages and avoid sending money to scammers.

Cybersecurity
The Drawings Touch List: A Simple Step Toward Compliance

The Drawings Touch List: A Simple Step Toward Compliance

Published on: 11/03/2026

A simple “Drawings Touch List” helps manufacturers track who accesses engineering drawings, devices, and storage locations. This visibility improves cybersecurity, strengthens operational resilience, and supports CMMC and NIST 800-171 compliance.

Cybersecurity
One Move to Rule Them All: MFA + Named Accounts

One Move to Rule Them All: MFA + Named Accounts

Published on: 06/03/2026

Improve security & CMMC readiness with one move: MFA everywhere + Named Accounts. Stop using shared "admin" logins and start tracking who accessed what, when, and why. The simple path to traceability for California SMBs.

CybersecurityMetal Finishin