👋 Welcome to Cyber Pulse SA
Welcome to Issue #003 of Cyber Pulse SA.
Each week, we highlight real cybersecurity risks affecting San Antonio businesses and households, then break them down into simple actions you can take without needing a full IT team.
🔒 This Week’s Focus: Phishing Is Getting Personal
Phishing attacks are no longer obvious spam emails with poor grammar. Today’s attacks are short, targeted, and often impersonate people you already trust, such as vendors, coworkers, or even local organizations.
Across Texas, businesses are seeing an increase in:
Fake invoice and payment update emails
Password reset and MFA fatigue attacks
Text message and QR code-based phishing
The goal is the same: steal credentials or trick someone into sending money.
📊 Local & National Threat Snapshot
CISA continues to actively add exploited vulnerabilities
Attackers are actively exploiting known vulnerabilities with available patches, reinforcing the importance of timely updates.
(Source: CISA https://www.cisa.gov/known-exploited-vulnerabilities)Business Email Compromise remains a top loss category
The FBI reports that invoice fraud and impersonation scams remain among the most costly cybercrime types for businesses.
(Source: FBI IC3 https://www.ic3.gov)QR code phishing on the rise
Attackers are increasingly using QR codes in emails, flyers, and even physical locations to redirect users to fake login pages.
(Source: BleepingComputer https://www.bleepingcomputer.com)Critical vulnerabilities continue to impact widely used software
Newly disclosed vulnerabilities with high severity scores affect standard operating systems and applications used by SMBs.
(Source: NIST NVD https://nvd.nist.gov)
📱 Device Security Tip of the Week
Be cautious with QR codes.
QR codes can hide malicious links just like emails can. Avoid scanning codes from unexpected emails, posters, or messages. When possible, navigate directly to websites instead of relying on QR codes to log in or reset passwords.
🛠 Quick Wins for San Antonio Businesses
Train employees to verify payment change requests verbally
Enable MFA on email and cloud applications
Block legacy authentication where possible
Disable QR codes in email clients if supported
Remind staff to slow down before clicking links or scanning codes
Review vendor contact and payment procedures quarterly
🗓 Cyber Risk Assessment
If you are unsure whether your business is exposed to phishing or impersonation risks, we offer a Cyber Risk Assessment for San Antonio businesses.
👉 Book a Cybersecurity Risk Assessment
https://links.orobi.io/widget/bookings/orobi-cybersecurity-solutions-calendar-o5in0x3xj
📬 Final Thoughts
Cybersecurity attacks succeed when urgency overrides verification. Slowing down, confirming requests, and building simple habits can stop many incidents before they start.
Consistency beats complexity.
— Carlos
Orobi Cybersecurity Solutions
