Nic Allen's Avatar

Nic Allen

@thenicallen.bsky.social

Dad, IT nerd, gamer. Neurodivergent. Co-Founder and Chief Technology Officer @ GTG.Online Former Google, HPE, SimpliVity

145 Followers  |  678 Following  |  39 Posts  |  Joined: 12.10.2024  |  2.0967

Latest posts by thenicallen.bsky.social on Bluesky

Infographic showing 2024 US phone scam losses ($25 B), senior impact, top scam types, and Beaconโ€™s free risk-score solution.

Infographic showing 2024 US phone scam losses ($25 B), senior impact, top scam types, and Beaconโ€™s free risk-score solution.

Phone and text scams cost Americans $25B in 2024 alone. @gtgonline.bsky.social built Beacon to fight back. Submit any unknown or sketchy number, and receive an immediate risk score.

beacon.gtg.online

#Cybersecurity #ScamPreventions #SecuritySky #CyberInnovation #StaySafeOnline

21.06.2025 13:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Infographic showing 2024 US phone scam losses ($25 B), senior impact, top scam types, and Beaconโ€™s free risk-score solution.

Infographic showing 2024 US phone scam losses ($25 B), senior impact, top scam types, and Beaconโ€™s free risk-score solution.

Phone and text scammers cost Americans $25B last year.

@gtgonline.bsky.social built Beacon to fight back: submit any unknown or sketchy number, instantly receive a risk score; free, no tracking.

beacon.gtg.online

#Cybersecurity #GTGBeacon #ScamPrevention #Infosec

21.06.2025 13:55 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
#cybersecurity #scamprevention #gtgbeacon #digitaltrust | Nic Allen | 31 comments A few weeks ago, one of my nieces forwarded a screenshot of a text message she received. It claimed to be from a recruitment assistant at Indeed, promising an enticing part-time or full-time remote jo...

My niece received a fake job offer claiming to be from Indeed. She immediately checked with me. Not everyone has a cybersecurity expert to consult, so we built Beacon. Quick, reliable scam checks for everyone. More on LinkedIn:

www.linkedin.com/posts/nicall...

#Cybersecurity #ScamPrevention

10.06.2025 18:42 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Caller Beware: How Phone Scammers Use Fear Against You Understanding the "Process Server" Phone Scam and Staying Protected

Receive a scary call about unpaid bills or legal trouble? A common phone scam is probably targeting you. I wrote about how to spot it, and what we're doing to help stop it at @gtgonline.bsky.social with Beacon.

open.substack.com/pub/thenical...

#PhoneScam #FraudAlert #CyberSecurity

28.05.2025 19:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Smishing Scams: How Text Messages Became the New Cyber Threat Protecting Yourself from Fraudulent Text Messages

Smishing, scams delivered via SMS, are sneakier than ever. Fake toll bills, bogus delivery notifications, fake account alertsโ€ฆ scammers are stepping up their game.

open.substack.com/pub/thenical...

#CyberSecurity #Smishing #OnlineSafety #Phishing #Awareness

14.05.2025 17:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Small Business Cybersecurity: Keeping it Simple for Safety Why simpler cybersecurity tools offer stronger protection, and how your SMB can adopt them today.

Complex cybersecurity doesn't always equal better security, especially for small businesses.

thenicallen.substack.com/p/small-busi...

#Cybersecurity #SmallBusiness #SimplifySecurity

13.05.2025 21:54 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
How a Single Letter Could Cost Your Business Everything The Critical Importance of Email Security and Proactive Cybersecurity Measures

One sneaky letter swap in a domain nearly killed a business overnight. Cyber threats like typosquatting are getting smarter and scarier, especially for SMBs.

Proactive cybersecurity isn't just IT, it's survival.

thenicallen.substack.com/p/how-a-sing...

#CyberSecurity #EmailSecurity

03.05.2025 15:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
The Forgotten Frontier of Cybersecurity Why Protecting Consumers from Email, SMS, and Phone Fraud is Critical

Cybersecurity often fails to protect personal accounts from email, SMS, and phone scams, exposing retirees, young adults, and even enterprises to risks.

It's time we work on closing this gap.

thenicallen.substack.com/p/the-forgot...

#Cybersecurity #FraudPrevention #ConsumerProtection

30.04.2025 22:06 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Beyond DMARC: Next-Generation Email Security Why SPF, DKIM, and DMARC Alone Wonโ€™t Protect Your Organization from Advanced Email Threats

SPF, DKIM, and DMARC aren't enough to stop advanced email threats. It's time for email security to evolve.

thenicallen.substack.com/p/beyond-dma...

#EmailSecurity #Cybersecurity #ThreatIntelligence

25.04.2025 22:59 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Email Security Needs More than SPF, DKIM, and DMARC Why Traditional Email Security Protocols Fall Short Against Sophisticated Attacks

Email security isnโ€™t solved by SPF, DKIM, and DMARC alone. Attackers are evolving, and so should our defenses.

substack.com/home/post/p-...

#Cybersecurity #EmailSecurity #Phishing #SPF #DMARC #InfoSec

23.04.2025 23:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

There has been a great response in our first week of running this campaign.

Please continue submitting those #smishing and #scammer phone numbers so we can analyze them!

gtg.online/report

26.03.2025 21:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Scammer Number Submission Form GTG.Online is launching a new Phone Scammer Registry to help combat fraudulent calls and text messages. Your cooperation can help protect others from scams and unwanted communications. Please enter th...

Is anyone else tired of getting smishing text messages and scam calls daily? If you are and can spare a few seconds when they're received, please add them to our Phone Scammer Registry. We're not just interested in stopping phishing; we want to stop #scammers everywhere.

gtg.online/report

23.03.2025 01:28 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1

Iโ€™d love to hear from fellow IT and cybersecurity professionals: What pivotal shifts have you witnessed in your organizations? How are you adapting to new threats and opportunities? /end

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Adapting isnโ€™t just a technical upgrade; itโ€™s a cultural shift. It requires us to challenge old assumptions and continuously learn, experiment, and refine our security practices. 6/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Over my years in the field, Iโ€™ve seen firsthand how embracing such transformation creates opportunities to build more resilient systems. Itโ€™s a challenging journey but also a chance to lead the charge in redefining cybersecurity. 5/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

4/ This pivot forced the cybersecurity world to evolve. New attack vectors, rapid threat detection, and innovative risk management practices became essential. Patching systems wasnโ€™t enough; companies had to reimagine their entire approach. 4/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Microsoftโ€™s shift to Azure wasnโ€™t merely a product update but a fundamental IT infrastructure and security rethinking. Moving to the cloud meant facing new vulnerabilities while unlocking new levels of agility. 3/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Take Microsoft as a case in point. Not long ago, their core business was built on Windows and Office. But as cloud computing emerged, the game was about to change. 2/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Change isnโ€™t just constant in IT and cybersecurity; itโ€™s accelerating. If we donโ€™t pivot, we risk being left behind by emerging threats and evolving technology. 1/7

04.02.2025 19:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

To that end, we're looking for beta testers for our new anti-phishing product, Verify. Let me know if you're interested in signing up. I promise you you can bring your checklists with you. I'll probably have one myself. /end

#GTGOnline #InfoSec #Phishing #CyberSecurity #Checklists

17.12.2024 22:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Modern InfoSec isn't about adherence to a process; it's about developing cohesive systems that can catalog, identify, and connect threats and then use that information, along with historical trends, to develop meaningful strategies and responses. @gtgonline.bsky.social is developing this. 6/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1

If we do this correctly, we can develop deeper intelligence, promote adaptability, and create true resilience against adversaries who are no longer simply following a script. Checklists have their place, but they're not transformative and allow us to be complacent because "we have a plan." 5/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Let's look beyond predetermined steps and start looking to be proactive. Instead of relying on a linear process, we must design systems that anticipate shifts in the threat landscape and ensure that our defenses can work dynamically. 4/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

We need to reimagine InfoSec. Look at threats holistically instead of a scenario that requires that a series of boxes get checked. Again, love the dopamine, but that doesn't solve problems. The post in question drove home the idea that the industry doesn't seem to have any forward vision. 3/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Checklists are a baseline and helpful to ensure that obvious items aren't missed. However, relying on them as a primary safeguard in cybersecurity seems incredibly counterintuitive. They can prevent common mistakes, but they're not the transformative measure the individual made them out to be. 2/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Clipart of a checklist with items marked off, indicating that they have been completed, and a pencil next to one.

Clipart of a checklist with items marked off, indicating that they have been completed, and a pencil next to one.

๐Ÿงต
I was on LinkedIn today and came across a post that frustrated me. It started as an anecdote about checklists and how they're beneficial. I get it. Checklists are great; give me that dopamine hit! Then, it was tied to how they can make organizations more resilient in cybersecurity. 1/7

17.12.2024 22:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

No, that is not how you exit Vim.

06.12.2024 07:25 โ€” ๐Ÿ‘ 256    ๐Ÿ” 27    ๐Ÿ’ฌ 30    ๐Ÿ“Œ 10

Email is the cornerstone of digital business identity. Taking steps to verify authenticity, prevent compromise, and build trust in every interaction is essential. Protect sensitive data and safeguard your reputation by securing your inbox.

#EmailSecurity #CyberSecurity #InboxProtection

06.12.2024 14:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cloudflareโ€™s developer domains increasingly abused by threat actors Cloudflare's 'pages.dev' and 'workers.dev'ย domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious...

Attackers are using corrupted Word docs to bypass filters, tricking users into scanning QR codes that steal credentials. Smarter email security is key to combat these creative tactics. Stay informed and protect your business. #CyberSecurity #Phishing

www.bleepingcomputer.com/news/securit...

04.12.2024 14:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Image from Krebs Security article highlighting the top 5 gTLDs that are attracting scammers along with their ranks, the number of cybercrime domains reported and the year over year change from 2023 to 2024.

Image from Krebs Security article highlighting the top 5 gTLDs that are attracting scammers along with their ranks, the number of cybercrime domains reported and the year over year change from 2023 to 2024.

Phishing attacks are surging, with new gTLDs like .shop and .xyz fueling a 40% rise. These domains are cheap and easy targets for scammers. Staying ahead means proactive monitoring, validating communications, and uncovering attack patterns to secure your organization against evolving threats.

03.12.2024 14:43 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@thenicallen is following 17 prominent accounts