email
Get the newsletter
Newsletter
search
Search blog
January 01, 2026 • read

Technology Tips: January 2026 Edition

LinkedIn Card
Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

Pretexting attacks

If you’ve ever wondered how hackers find specific details about your life, you probably don’t have to look farther than social media. Bad actors often use pretexting to target and hook victims.

Pretexting is when cybercriminals use a made-up story, or pretext, to convince their target to do something that will harm themselves or their organization. Hackers will look for posts online such as:
  • “Thank you to our COO Millie James for donating to Toys for Tots.”
  • “I’m heading on a trip to the Bahamas with my son James. See you in two weeks!”
  • “My wife Laura and I just bought a house! We are loving the Pinewood Neighborhood!”

These examples share names and personal details of each individual that a hacker could use to manipulate their victims.

To mitigate these types of attacks, avoid sharing personal details online. Verify all requests to connect or be your social media “friend.” Confirm your social media privacy settings. Be cautious if someone is texting you and then wants to move the communication to social media or WhatsApp—these are telltale tactics of a hacker.

 

Delay Office Outlook emails after hitting send

If you haven’t sent an email to the wrong person or forgot an attachment, you just haven’t been in corporate America long enough. Office Outlook gives you the option to delay your emails by 5, 10, 15, 20, 30, 60, or 120 seconds after hitting send.

undo send dialog options screenshot

Go to Outlook > Settings > Composing > Undo Send > then select your preferred time frame. In just a few clicks you’ll be set up for a delayed send and peace of mind.


 

The pros and cons of contactless payments

The use of contactless payments is rising, and for many convenient reasons. As with all new technology, you may be wondering what the risks are.

The pros: 
  1. Time savings: Contactless means that you aren’t handling cash or waiting for change, and it also keeps lines going a bit quicker.
  2. Flexibility: You can have your cards digitally saved to your phone, so you no longer need a bulky wallet.
  3. Health: Not having to handle cash or touch a card reader is a perk for those with health concerns.

The cons:
  1. Limits: Not all retailers accept contactless payments, so it’s important to have a backup option when shopping.
  2. Safety concerns: A PIN is not used in these transactions, so there isn’t a way for cashiers to determine if the device being used is stolen.
  3. Technical: A contactless payment option is not for consumers that may face technical barriers, such as technical knowledge or not having a compliant smart phone.
 

Malware of the month

A new Comparitech study shows that U.S. companies take an average of 4.1 months to report a data breach after a ransomware attack, with reporting times rising from 2.1 months in 2018 to over five months in 2023. Some sectors take even longer—law firms average 6.4 months, and one healthcare breach went unreported for 38 months.

This delay leaves victims unaware that their sensitive data may already be circulating on dark web leak sites, sometimes posted by attackers within one month if ransom negotiations fail. To keep yourself safe, always assume delays in breach notifications and proactively protect your data by using strong passwords, monitoring financial accounts, enabling MFA (multi-factor authentication), and staying alert to identity theft risks.


 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Technology Tips: October 2024 Edition

October brings many things: crisp air, Halloween fun, and Cybersecurity Awareness Month! This edition of Tech Tips is filled to the brim with harrowing hacker facts that just might make your skin crawl!

October 22, 2024 • Tips
SMS 2.0 Spotlight: SkyBuild

Did you know there’s a tool you can use to integrate Skyward with all your third-party programs and make sharing data between them a breeze?

January 12, 2022 • Tips
How Skyward Software is Made

Check out this article and video for a behind-the-scenes look at how our software is made!

September 19, 2024 • Product Updates

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.