Watch Out for This Amazon Text Scam
By in

Watch Out for This Amazon Text Scam

A new text message scam is making the rounds, and it’s designed to look like it came straight from Amazon.

The message claims that an item you purchased has failed a “routine quality inspection” or has been recalled. It offers you a full refund without needing to return the product. All you have to do, it says, is tap the link provided in the text.

It sounds convenient, but it’s a trap. This is a smishing scam, short for SMS phishing, where cybercriminals use fake text messages to lure you into revealing personal information.

If you click the link, you’ll be taken to a convincing copy of Amazon’s official website. Once there, you’ll be prompted to enter your Amazon login credentials, payment information, and other sensitive data. Unfortunately, if you provide this information, the scammers can hijack your Amazon account, make purchases in your name, and even steal your money.

How to Protect Yourself from Smishing Scams

  • Never tap links in unexpected text messages. If you need to check on an order, go directly to Amazon’s official website or app.
  • Be suspicious of “too good to be true” offers. Scammers count on the urgency of a no-questions-asked refund to make you act before thinking.
  • Report suspicious texts. Use your phone’s “Report Junk” or “Report Spam” feature, then delete the message.

At Citynet, we know that staying cyber-safe takes awareness as much as technology. That’s why we offer Security Awareness Training from KnowBe4 to help businesses and their employees recognize scams like this before they cause harm.

Stay alert. Stay secure. Stay protected with Citynet.

Don’t let someone you care about get caught. Pass this along so they can stay safe, too.

Tech Talk Decoded: Top Terms & Acronyms You Should Know in 2025
By in

Tech Talk Decoded: Top Terms & Acronyms You Should Know in 2025

Technology changes fast, and so does the language that comes with it. Whether you’re talking about internet speeds, cybersecurity tools, or the latest Wi-Fi standards, new acronyms and buzzwords pop up all the time.

To help you stay in the know, here’s your plain-English guide to the top tech terms you might hear in 2025, plus real-world examples where it helps to make them click.

Broadband & Connectivity

Fiber – High-speed internet delivered via fiber-optic cables, offering faster and more reliable service than cable or DSL.

Example: Citynet’s fiber internet service delivering up to 10 GIG symmetrical speeds.

Symmetrical Speeds – Upload and download speeds that are the same — ideal for video calls, file uploads, and streaming.

Mbps – Megabits per second, a measure of internet speed.

Example: 1,000 Mbps = 1 GIG speed.

GIG – Short for gigabit, equal to 1,000 Mbps.

BEAD – Broadband Equity, Access, and Deployment Program, a federal funding initiative to expand high-speed internet in underserved areas.

Middle Mile – The network infrastructure that connects local access points (like neighborhoods) to the broader internet backbone.

Latency – The delay between sending and receiving data, important for gaming and video conferencing.

Wi-Fi & Networking

SSID – Service Set Identifier, your network’s public name.

Router – The device that sends internet signals throughout your home or business.

Mesh Wi-Fi – A system of multiple access points that provides stronger, more consistent coverage.

Example: Citynet’s mesh-capable routers paired with the Intellifi app.

Intellifi App – Citynet’s network control app that lets you manage devices, set parental controls, run speed tests, and more — all from your phone.

SSID Broadcast – Whether your Wi-Fi network name is visible to others.

Wi-Fi 6 / Wi-Fi 7 – The latest Wi-Fi standards offering faster speeds, lower latency, and better device handling.

Example: Wi-Fi 7 supports multi-gigabit speeds to handle dozens of connected devices simultaneously.

Business Tech

Phishing – A scam where attackers trick you into sharing personal information by pretending to be a trusted source.

Example: A fake email that looks like it’s from your bank asking you to “verify your account.”

Smishing – Phishing via text message (SMS).
Example: A text claiming to be from Amazon offering a refund if you click a link.

MFA – Multi-Factor Authentication, a security step requiring more than just a password to log in.

Example: Logging in with a password and a code sent to your phone.

VPN – Virtual Private Network, which encrypts your internet connection for privacy.

Example: Using a VPN to securely connect to your work network while traveling.

Ransomware – Malicious software that locks your files until you pay a ransom.

Example: The 2021 Colonial Pipeline cyberattack.

Zero Trust – A security model that assumes no user or device is trusted by default, even inside a network.

Deepfake – AI-generated audio, video, or images that convincingly mimic real people.
Social Engineering – Manipulating people into giving up confidential information.

Example: A caller pretending to be from IT asking for your login credentials.

Business Tech

VoIP – Voice over Internet Protocol, a phone service that runs over your internet connection.

Example: Citynet Business VoIP, Zoom Phone, RingCentral.

SaaS – Software as a Service, cloud-based applications you can use without installing software locally.

Popular Examples: Microsoft 365, Google Workspace, Zoom, Dropbox.

PaaS/IaaS – Platform as a Service / Infrastructure as a Service, cloud solutions for developers and businesses.

Popular Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Heroku.

IoT – Internet of Things, everyday objects connected to the internet, like smart thermostats or security cameras.

Example: Ring doorbells, Nest thermostats, connected refrigerators.

UCaaS – Unified Communications as a Service, a cloud platform that integrates phone, messaging, and video conferencing.

Popular Examples: Webex, Microsoft Teams, RingCentral, Zoom Phone.

Edge Computing – Processing data closer to where it’s generated instead of relying solely on a central data center.

Example: Smart traffic lights analyzing vehicle flow locally to reduce delays.

Tech terms will keep evolving, but knowing the basics helps you make informed decisions, ask the right questions, and stay secure online.

At Citynet, we’re here to make technology work for you. Whether it’s delivering fiber internet, improving network performance, or providing cybersecurity solutions, we help you stay connected, informed, and protected.

Why Immutable Backup Should Be Part of Your Strategy
By in

Why Immutable Backup Should Be Part of Your Strategy

SMBs, Don’t Let Ransomware Destroy Your Business!

For small and medium-sized businesses, a single cyberattack can be devastating. Whether it’s ransomware, accidental deletion, or insider threats, losing your data means lost productivity, lost revenue, and in some cases, lost customers.

That’s where immutable backup comes in.

What is Immutable Backup?

Immutable backup means your backed-up data can’t be altered, deleted, or encrypted even by a hacker or rogue employee. Once your backup is saved, it’s locked in place for a set amount of time. You can restore it, but you can’t tamper with it.

This gives your business a clean, untouchable copy of your data you can rely on, no matter what.

Why It’s Critical for SMBs

SMBs are a top target for ransomware. Why? Because many don’t have the time, staff, or budget for enterprise-grade cybersecurity. Attackers know that. That’s why newer ransomware variants are built to seek out and destroy backups first, forcing businesses to pay up. With immutable backup, even if your network is compromised, your data is not. You can recover quickly and avoid paying the ransom.

Real-World Benefits for Your Business

  • Ransomware Resilience – Your backup stays safe even if your network is breached.
  • Regulatory Compliance – Meet HIPAA, PCI, or other industry requirements with confidence.
  • Peace of Mind – You don’t need to wonder if your backups will work when it counts.
  • Faster Recovery – Get back up and running without starting from scratch.
  • Cost-Effective Protection – Immutable backup is more affordable than you think—and far cheaper than downtime or ransom payments.

How Citynet Protects Your Business

At Citynet, we understand the unique challenges SMBs face. That’s why our managed IT and cybersecurity services are built to be powerful, practical, and scalable. No bloated solutions or confusing tech talk.

With Citynet, you get:

  • Immutable backups as part of our managed backup and disaster recovery plans
  • Monitoring and support from our in-house West Virginia-based team
  • Flexible cloud or hybrid options to fit your business size and budget
  • Expert guidance so you’re never left wondering what’s next

Let Citynet make your business ransomware-ready, recovery-capable, and future-proof!

The Scam You Haven’t Heard About Yet: Deepfake Voicemail Fraud
By in

The Scam You Haven’t Heard About Yet: Deepfake Voicemail Fraud

Cybercriminals are getting smarter – and sneakier. One of the fastest-growing threats targeting businesses right now? Deepfake voicemail scams.

How It Works

Attackers use AI to clone voices from public recordings—like YouTube videos, webinars, or even voicemail greetings. They then leave urgent-sounding voicemails pretending to be a CEO, manager, or trusted colleague, pressuring employees to:

  • Transfer money
  • Share sensitive information
  • Click a malicious link

These voicemails can sound incredibly convincing, and they don’t get flagged by email filters. This scam has already cost businesses millions globally. Smaller businesses are especially vulnerable because attackers often know that internal verification processes are less formal.

How to Stay Protected

  • Slow Down
    Never rush to act on a voicemail, even if it sounds urgent.
  • Verify Requests
    Call or message the person back using your regular contact methods, not the number in the voicemail.
  • Employee Awareness
    Educate your team about this threat. A quick awareness session can prevent big losses.
  • Layered Security
    Citynet Managed Services clients already benefit from advanced threat protections, but social engineering requires human awareness too.

The Bottom Line

Technology can now fake voices, but simple verification steps can stop scams in their tracks. Need help with security awareness training? Citynet can help.

Citynet President & CEO Jim Martin Appointed to West Virginia University Board of Governors
By in

Citynet President & CEO Jim Martin Appointed to West Virginia University Board of Governors

Bridgeport, W.Va., July 21, 2025 – Citynet is proud to announce that its President and CEO, Jim Martin, has been appointed to the West Virginia University (WVU) Board of Governors by West Virginia Governor Patrick Morrisey.

Mr. Martin joins a distinguished group of appointees that includes Bray Cary and Oliver Luck, both well-respected leaders in business and sports management. Their appointments reflect a commitment to strong, forward-looking leadership at the state’s flagship university.

A lifelong West Virginian and entrepreneur, Jim Martin has been a champion for broadband expansion and technology advancement across the Mountain State. As the founder of Citynet, one of West Virginia’s leading telecommunications and broadband infrastructure companies, Martin has worked tirelessly to improve broadband access, especially in rural and underserved areas. He launched his first company, MARCOM, while studying computer science at WVU and has continued to drive innovation and economic opportunity throughout his career.

“I am honored to be appointed to the WVU Board of Governors,” said Martin. “West Virginia University helped shape my path as an entrepreneur and business leader. I look forward to giving back to my alma mater and supporting its critical mission of preparing future generations of West Virginians for success.”

Martin has a long history of public service, having served on the West Virginia Broadband Deployment Council and the boards of the West Virginia State Chamber of Commerce and the Harrison County Chamber of Commerce. His work alongside state and local governments, nonprofit coalitions, and industry partners has made a significant impact in advancing high-speed fiber connectivity across the state.

“We are incredibly proud of Jim’s appointment to the WVU Board of Governors,” said Todd Dlugos, Chief Operating Officer of Citynet. “Jim’s leadership has always been rooted in a deep love for West Virginia and a desire to see it thrive. WVU will benefit from his business expertise, entrepreneurial spirit, and commitment to our state’s future.”

Governor Morrisey also reappointed Bray Cary, a seasoned media executive, and named Oliver Luck, a nationally recognized sports executive and WVU alumnus, to the Board of Governors. Together, these appointees bring decades of leadership experience and a shared passion for strengthening West Virginia’s educational and economic landscape.

Don’t Be Fooled: Why Every Business Must Prepare for the Rise of Deepfake Attacks
By in

Don’t Be Fooled: Why Every Business Must Prepare for the Rise of Deepfake Attacks

Cybercriminals are getting craftier. It’s no longer just about phishing emails or suspicious links. Today’s attackers are using hyper-realistic deepfakes to impersonate voices and faces. These new threats are blurring the lines between real and fake, and every business, no matter the size, is at risk.

Deepfakes: The New Face of Social Engineering

Social engineering has always been about exploiting human trust. But now, AI-driven deepfakes make it shockingly easy for threat actors to create fake audio or video messages that look and sound just like someone you know: your boss, your vendor, your colleague.

Imagine getting a voicemail that sounds exactly like your CEO asking for an urgent wire transfer. Would you think twice?

These attacks are highly convincing, and that’s the danger.

What You Need to Do

To defend your business, you need more than firewalls. You need smart policies, constant vigilance, and a trusted technology partner.

Here are five essential steps to take:

  • Educate Your Team
    Make sure everyone from entry-level staff to leadership understands the risks of deepfakes and social engineering. Awareness is your first defense.
  • Always Verify Suspicious Requests
    If you receive a call, email, or message requesting sensitive information, login credentials, or financial transfers, even if it appears or sounds legitimate, stop and verify. Contact that person directly using a method you’ve used before (such as their known mobile number, internal extension, or direct email address).
    Never trust a communication at face value, especially if it pressures you to act quickly or bypass normal procedures.
  • Implement Strong Access Controls
    Use multi-factor authentication (MFA), role-based access, and password policies to reduce the impact of compromised accounts.
  • Back Up Your Data Regularly
    If something does go wrong, a secure, cloud-based backup can mean the difference between a quick recovery and a business-ending disaster.
  • Partner with a Cybersecurity Expert
    The threat landscape is too complex to go it alone.

Citynet Has Your Back

Citynet helps businesses stay protected with comprehensive managed security services, including:

  • Real-time Threat Detection and Response
  • Security Awareness Training, including social engineering and phishing simulation
  • 24/7 Network Monitoring
  • Cloud Backup & Disaster Recovery
  • Zero Trust Solutions and MFA Integration
  • Proactive Patch & Vulnerability Management
Wi-Fi 5 vs. Wi-Fi 6 vs. Wi-Fi 7: What’s the Difference, and Why It Matters for Your Internet Experience
By in

Wi-Fi 5 vs. Wi-Fi 6 vs. Wi-Fi 7: What’s the Difference, and Why It Matters for Your Internet Experience

As more of our lives go online, streaming, gaming, working from home, and managing smart devices, reliable Wi-Fi is more important than ever. But not all Wi-Fi is created equal. If you’ve seen terms like Wi-Fi 6 or Wi-Fi 7 and wondered how they compare to what you already have, you’re not alone.

Let’s break down the differences between today’s most common Wi-Fi versions so you can decide if an upgrade might be right for you.

Wi-Fi 5: The Workhorse Most People Still Use

Also known as 802.11ac, Wi-Fi 5 has been around since 2014 and is still the most widely used version today. It brought faster speeds and better support for multiple devices than its predecessor, making it a reliable option for general use like HD streaming and web browsing.

Key Features:

  • Top speeds up to 3.5 Gbps
  • Uses the 5 GHz band (less interference than 2.4 GHz)
  • Good for homes with fewer smart devices

Limitations:

  • Not ideal for homes with lots of connected devices
  • Can struggle in larger homes or through walls

Wi-Fi 6: Built for a Connected World

Wi-Fi 6 (also called 802.11ax) came out in 2019 and is designed to handle the explosion of connected devices. It’s faster and more efficient, especially in busy households or offices.

Benefits Over Wi-Fi 5:

  • Speeds up to 9.6 Gbps
  • Supports more devices at once with less slowdown
  • Improved performance in congested areas (think apartments or smart homes)
  • Better battery life for phones and laptops

Why Upgrade?

If your home is filled with smart TVs, security cameras, phones, tablets, and gaming consoles, Wi-Fi 6 can keep everything running smoothly, even during peak usage.

Wi-Fi 7: The Next Generation (and It’s Blazing Fast)

Wi-Fi 7 (aka 802.11be) is just rolling out and is the most advanced version yet. It’s built for future-forward homes and businesses, where ultra-high-definition video, AR/VR, and lightning-fast downloads are the norm.

What’s New with Wi-Fi 7:

  • Potential speeds of over 40 Gbps
  • Lower latency for gaming and video calls
  • Ideal for dense environments like offices, stadiums, or homes with heavy users

Should You Upgrade Now?

Wi-Fi 7 routers are available, but most devices don’t support it yet. If you want to future-proof your network, it’s worth considering, but Wi-Fi 6 is still more than enough for most users today.

The Bottom Line: Your Router Matters, But So Does Your Internet Connection

Even the best Wi-Fi router can only do so much if your internet connection is slow or outdated. Citynet’s GIG Fiber Internet delivers blazing-fast, symmetrical speeds (upload and download) and works beautifully with the latest Wi-Fi tech. Whether you’re on Wi-Fi 5, 6, or exploring Wi-Fi 7, a solid fiber backbone makes all the difference.

SMBs, Don’t Let Ransomware Destroy Your Business
By in

SMBs, Don’t Let Ransomware Destroy Your Business

Why Immutable Backup Should Be Part of Your Strategy

For small and medium-sized businesses, a single cyberattack can be devastating. Whether it’s ransomware, accidental deletion, or insider threats, losing your data means lost productivity, lost revenue, and in some cases, lost customers.

That’s where immutable backup comes in.

What is Immutable Backup?

Immutable backup means your backed-up data can’t be altered, deleted, or encrypted, even by a hacker or rogue employee. Once your backup is saved, it’s locked in place for a set amount of time. You can restore it, but you can’t tamper with it.

This gives your business a clean, untouchable copy of your data you can rely on, no matter what.

Why It’s Critical for SMBs

SMBs are a top target for ransomware. Why? Because many don’t have the time, staff, or budget for enterprise-grade cybersecurity. Attackers know that. That’s why newer ransomware variants are built to seek out and destroy backups first, forcing businesses to pay up.

With immutable backup, even if your network is compromised, your data is not. You can recover quickly and avoid paying the ransom.

Real-World Benefits for Your Business

  • Ransomware Resilience  – Your backup stays safe, even if your network is breached.
  • Regulatory Compliance –  Meet HIPAA, PCI, or other industry requirements with confidence.
  • Peace of Mind – You don’t need to wonder if your backups will work when it counts.
  • Faster Recovery – Get back up and running without starting from scratch.
  • Cost-Effective Protection – Immutable backup is more affordable than you think—and far cheaper than downtime or ransom payments.

How Citynet Protects Your Business

With Citynet, you get:

  • Immutable backups as part of our managed backup and disaster recovery plans
  • Monitoring and support from our in-house West Virginia-based team
  • Flexible cloud or hybrid options to fit your business size and budget
  • Expert guidance so you’re never left wondering what’s next

Don’t Wait for a Crisis to Protect Your Data

If your current backup could be deleted, encrypted, or overwritten… it’s not enough. And when disaster strikes, it’s too late to fix it.

Immutable backup gives you the confidence to grow your business, knowing your data is secure.

Let’s make your business ransomware-ready, recovery-capable, and future-proof. 

Contact us today or call us at 1.844.CITYNET.

From Internet to Endpoint: Why One Provider for All Makes a Difference
By in ,

From Internet to Endpoint: Why One Provider for All Makes a Difference

In today’s fast-moving digital world, businesses need more than just internet connectivity; they need a technology partner who can power their entire network, protect it, and support it every step of the way.

That’s why more businesses are choosing Citynet as their all-in-one technology provider. From high-speed fiber internet to endpoint security, cloud, managed IT, and cybersecurity solutions, we simplify your tech stack and strengthen your operations without the finger-pointing that comes from juggling multiple vendors.

Here’s why choosing one trusted provider for all your connectivity and technology needs matters more than ever:

1. No More Finger-Pointing

When something goes wrong, the last thing you want is a blame game between vendors. With Citynet, you have one team accountable for it all: connectivity, cybersecurity, cloud, devices, and support. One provider. One point of contact. One answer.

2. Seamless Integration

When your internet, network security, endpoint protection, and IT services are all managed by a single provider, everything just works better. Systems are configured to work together, reducing friction and improving performance.

3. Simplified Support and Billing

Tired of managing multiple vendors, invoices, and support numbers? With Citynet, you get consolidated billing and expert 24/7 support.

4. Proactive Security and Worry-Free IT Management

Citynet protects your network from the outside in and the inside out. Our managed services are built to reduce your IT burden while enhancing security, performance, and peace of mind. Our offerings include:

  • Advanced endpoint protection
  • Proactive network monitoring
  • Security Information and Event Management (SIEM)
  • Security awareness training
  • Multi-factor authentication (MFA)
  • Patch and update management
  • Cloud backup and disaster recovery
  • Fully managed IT services and user support

Whether you’re looking to offload your entire IT infrastructure or strengthen specific areas, Citynet delivers a fully managed, worry-free IT environment designed to protect, optimize, and empower your business.

5. A Partner Invested in Your Success

Citynet isn’t just a service provider. We’re a trusted partner committed to helping businesses grow securely, efficiently, and reliably, with the infrastructure, support, and solutions to scale with you.

Simplify. Secure. Succeed.

Let’s talk about a better way to manage your business technology. Contact us today.

Top 5 Security Risks Facing SMBs and How Managed Services Mitigate Them
By in

Top 5 Security Risks Facing SMBs and How Managed Services Mitigate Them

Small and mid-sized businesses (SMBs) are increasingly becoming prime targets for cybercriminals. Why? Because many lack the in-house resources and tools to mount a strong defense. But the impact of an attack can be just as devastating for a small business as for a large enterprise—sometimes even more so.

At Citynet, we understand that protecting your business goes beyond installing antivirus software or running occasional system updates. Our Managed Services team provides the comprehensive, proactive support SMBs need to defend against today’s most dangerous security risks.

Here are five of the top cybersecurity threats SMBs face and how Citynet helps mitigate them:

Phishing Icon Blog

1. Phishing Attacks

The Risk:
Phishing emails, fake login pages, and malicious links are among the most common attack methods. These social engineering tactics aim to trick employees into giving away sensitive information or access credentials.

How Citynet Helps:
Citynet offers Security Awareness Training for your staff, empowering them to recognize and avoid phishing attempts. We also provide advanced email filtering solutions that block suspicious messages before they reach inboxes.

Ransomware Icon Blog

2. Ransomware

The Risk:
Ransomware encrypts your data and demands payment for its release. One successful infection can lock down your entire business, often leading to days (or weeks) of costly downtime.

How Citynet Helps:
Our endpoint protection and real-time monitoring solutions stop ransomware in its tracks. Plus, with automated data backup and disaster recovery, we ensure your critical data is recoverable, no ransom required.

Software Update Icon Blog

3. Unpatched Systems and Software

The Risk:
Many cyberattacks exploit known vulnerabilities in outdated operating systems, applications, or devices.

How Citynet Helps:
We handle patch management and routine software updates as part of our Managed IT Services, so your systems stay protected without lifting a finger. You’ll always be up-to-date with the latest security fixes.

Unsecured Passwords Icon Blog

4. Weak or Compromised Passwords

The Risk:
Simple or reused passwords are a goldmine for hackers using credential stuffing or brute-force attacks.

How Citynet Helps:
We implement multi-factor authentication (MFA), secure password policies, and identity management tools to lock down user access. Our solutions help enforce good security hygiene without slowing your team down.

Monitoring Icon Blog

5. Lack of Visibility and Monitoring

The Risk:
Without a clear view into your network, you may never notice unusual activity until it’s too late.

How Citynet Helps:
Our CityCare Managed Network Monitoring provides 24/7 oversight of your systems and alerts us to suspicious behavior before it becomes a major issue. We also offer vulnerability assessments to identify and fix weaknesses in your infrastructure.

Protect More Than Your Network. Protect Your Business

Cybersecurity isn’t a one-and-done task. It’s an ongoing process that requires vigilance, expertise, and the right tools. That’s where Citynet comes in.

With our comprehensive Managed Services, we protect your business from all angles so you can focus on running it.

Let’s talk about securing your success.  Contact us today to schedule a free cybersecurity consultation.