The Scam You Haven’t Heard About Yet: Deepfake Voicemail Fraud
By in

The Scam You Haven’t Heard About Yet: Deepfake Voicemail Fraud

Cybercriminals are getting smarter – and sneakier. One of the fastest-growing threats targeting businesses right now? Deepfake voicemail scams.

How It Works

Attackers use AI to clone voices from public recordings—like YouTube videos, webinars, or even voicemail greetings. They then leave urgent-sounding voicemails pretending to be a CEO, manager, or trusted colleague, pressuring employees to:

  • Transfer money
  • Share sensitive information
  • Click a malicious link

These voicemails can sound incredibly convincing, and they don’t get flagged by email filters. This scam has already cost businesses millions globally. Smaller businesses are especially vulnerable because attackers often know that internal verification processes are less formal.

How to Stay Protected

  • Slow Down
    Never rush to act on a voicemail, even if it sounds urgent.
  • Verify Requests
    Call or message the person back using your regular contact methods, not the number in the voicemail.
  • Employee Awareness
    Educate your team about this threat. A quick awareness session can prevent big losses.
  • Layered Security
    Citynet Managed Services clients already benefit from advanced threat protections, but social engineering requires human awareness too.

The Bottom Line

Technology can now fake voices, but simple verification steps can stop scams in their tracks. Need help with security awareness training? Citynet can help.

Citynet President & CEO Jim Martin Appointed to West Virginia University Board of Governors
By in

Citynet President & CEO Jim Martin Appointed to West Virginia University Board of Governors

Bridgeport, W.Va., July 21, 2025 – Citynet is proud to announce that its President and CEO, Jim Martin, has been appointed to the West Virginia University (WVU) Board of Governors by West Virginia Governor Patrick Morrisey.

Mr. Martin joins a distinguished group of appointees that includes Bray Cary and Oliver Luck, both well-respected leaders in business and sports management. Their appointments reflect a commitment to strong, forward-looking leadership at the state’s flagship university.

A lifelong West Virginian and entrepreneur, Jim Martin has been a champion for broadband expansion and technology advancement across the Mountain State. As the founder of Citynet, one of West Virginia’s leading telecommunications and broadband infrastructure companies, Martin has worked tirelessly to improve broadband access, especially in rural and underserved areas. He launched his first company, MARCOM, while studying computer science at WVU and has continued to drive innovation and economic opportunity throughout his career.

“I am honored to be appointed to the WVU Board of Governors,” said Martin. “West Virginia University helped shape my path as an entrepreneur and business leader. I look forward to giving back to my alma mater and supporting its critical mission of preparing future generations of West Virginians for success.”

Martin has a long history of public service, having served on the West Virginia Broadband Deployment Council and the boards of the West Virginia State Chamber of Commerce and the Harrison County Chamber of Commerce. His work alongside state and local governments, nonprofit coalitions, and industry partners has made a significant impact in advancing high-speed fiber connectivity across the state.

“We are incredibly proud of Jim’s appointment to the WVU Board of Governors,” said Todd Dlugos, Chief Operating Officer of Citynet. “Jim’s leadership has always been rooted in a deep love for West Virginia and a desire to see it thrive. WVU will benefit from his business expertise, entrepreneurial spirit, and commitment to our state’s future.”

Governor Morrisey also reappointed Bray Cary, a seasoned media executive, and named Oliver Luck, a nationally recognized sports executive and WVU alumnus, to the Board of Governors. Together, these appointees bring decades of leadership experience and a shared passion for strengthening West Virginia’s educational and economic landscape.

Don’t Be Fooled: Why Every Business Must Prepare for the Rise of Deepfake Attacks
By in

Don’t Be Fooled: Why Every Business Must Prepare for the Rise of Deepfake Attacks

Cybercriminals are getting craftier. It’s no longer just about phishing emails or suspicious links. Today’s attackers are using hyper-realistic deepfakes to impersonate voices and faces. These new threats are blurring the lines between real and fake, and every business, no matter the size, is at risk.

Deepfakes: The New Face of Social Engineering

Social engineering has always been about exploiting human trust. But now, AI-driven deepfakes make it shockingly easy for threat actors to create fake audio or video messages that look and sound just like someone you know: your boss, your vendor, your colleague.

Imagine getting a voicemail that sounds exactly like your CEO asking for an urgent wire transfer. Would you think twice?

These attacks are highly convincing, and that’s the danger.

What You Need to Do

To defend your business, you need more than firewalls. You need smart policies, constant vigilance, and a trusted technology partner.

Here are five essential steps to take:

  • Educate Your Team
    Make sure everyone from entry-level staff to leadership understands the risks of deepfakes and social engineering. Awareness is your first defense.
  • Always Verify Suspicious Requests
    If you receive a call, email, or message requesting sensitive information, login credentials, or financial transfers, even if it appears or sounds legitimate, stop and verify. Contact that person directly using a method you’ve used before (such as their known mobile number, internal extension, or direct email address).
    Never trust a communication at face value, especially if it pressures you to act quickly or bypass normal procedures.
  • Implement Strong Access Controls
    Use multi-factor authentication (MFA), role-based access, and password policies to reduce the impact of compromised accounts.
  • Back Up Your Data Regularly
    If something does go wrong, a secure, cloud-based backup can mean the difference between a quick recovery and a business-ending disaster.
  • Partner with a Cybersecurity Expert
    The threat landscape is too complex to go it alone.

Citynet Has Your Back

Citynet helps businesses stay protected with comprehensive managed security services, including:

  • Real-time Threat Detection and Response
  • Security Awareness Training, including social engineering and phishing simulation
  • 24/7 Network Monitoring
  • Cloud Backup & Disaster Recovery
  • Zero Trust Solutions and MFA Integration
  • Proactive Patch & Vulnerability Management
Wi-Fi 5 vs. Wi-Fi 6 vs. Wi-Fi 7: What’s the Difference, and Why It Matters for Your Internet Experience
By in

Wi-Fi 5 vs. Wi-Fi 6 vs. Wi-Fi 7: What’s the Difference, and Why It Matters for Your Internet Experience

As more of our lives go online, streaming, gaming, working from home, and managing smart devices, reliable Wi-Fi is more important than ever. But not all Wi-Fi is created equal. If you’ve seen terms like Wi-Fi 6 or Wi-Fi 7 and wondered how they compare to what you already have, you’re not alone.

Let’s break down the differences between today’s most common Wi-Fi versions so you can decide if an upgrade might be right for you.

Wi-Fi 5: The Workhorse Most People Still Use

Also known as 802.11ac, Wi-Fi 5 has been around since 2014 and is still the most widely used version today. It brought faster speeds and better support for multiple devices than its predecessor, making it a reliable option for general use like HD streaming and web browsing.

Key Features:

  • Top speeds up to 3.5 Gbps
  • Uses the 5 GHz band (less interference than 2.4 GHz)
  • Good for homes with fewer smart devices

Limitations:

  • Not ideal for homes with lots of connected devices
  • Can struggle in larger homes or through walls

Wi-Fi 6: Built for a Connected World

Wi-Fi 6 (also called 802.11ax) came out in 2019 and is designed to handle the explosion of connected devices. It’s faster and more efficient, especially in busy households or offices.

Benefits Over Wi-Fi 5:

  • Speeds up to 9.6 Gbps
  • Supports more devices at once with less slowdown
  • Improved performance in congested areas (think apartments or smart homes)
  • Better battery life for phones and laptops

Why Upgrade?

If your home is filled with smart TVs, security cameras, phones, tablets, and gaming consoles, Wi-Fi 6 can keep everything running smoothly, even during peak usage.

Wi-Fi 7: The Next Generation (and It’s Blazing Fast)

Wi-Fi 7 (aka 802.11be) is just rolling out and is the most advanced version yet. It’s built for future-forward homes and businesses, where ultra-high-definition video, AR/VR, and lightning-fast downloads are the norm.

What’s New with Wi-Fi 7:

  • Potential speeds of over 40 Gbps
  • Lower latency for gaming and video calls
  • Ideal for dense environments like offices, stadiums, or homes with heavy users

Should You Upgrade Now?

Wi-Fi 7 routers are available, but most devices don’t support it yet. If you want to future-proof your network, it’s worth considering, but Wi-Fi 6 is still more than enough for most users today.

The Bottom Line: Your Router Matters, But So Does Your Internet Connection

Even the best Wi-Fi router can only do so much if your internet connection is slow or outdated. Citynet’s GIG Fiber Internet delivers blazing-fast, symmetrical speeds (upload and download) and works beautifully with the latest Wi-Fi tech. Whether you’re on Wi-Fi 5, 6, or exploring Wi-Fi 7, a solid fiber backbone makes all the difference.

SMBs, Don’t Let Ransomware Destroy Your Business
By in

SMBs, Don’t Let Ransomware Destroy Your Business

Why Immutable Backup Should Be Part of Your Strategy

For small and medium-sized businesses, a single cyberattack can be devastating. Whether it’s ransomware, accidental deletion, or insider threats, losing your data means lost productivity, lost revenue, and in some cases, lost customers.

That’s where immutable backup comes in.

What is Immutable Backup?

Immutable backup means your backed-up data can’t be altered, deleted, or encrypted, even by a hacker or rogue employee. Once your backup is saved, it’s locked in place for a set amount of time. You can restore it, but you can’t tamper with it.

This gives your business a clean, untouchable copy of your data you can rely on, no matter what.

Why It’s Critical for SMBs

SMBs are a top target for ransomware. Why? Because many don’t have the time, staff, or budget for enterprise-grade cybersecurity. Attackers know that. That’s why newer ransomware variants are built to seek out and destroy backups first, forcing businesses to pay up.

With immutable backup, even if your network is compromised, your data is not. You can recover quickly and avoid paying the ransom.

Real-World Benefits for Your Business

  • Ransomware Resilience  – Your backup stays safe, even if your network is breached.
  • Regulatory Compliance –  Meet HIPAA, PCI, or other industry requirements with confidence.
  • Peace of Mind – You don’t need to wonder if your backups will work when it counts.
  • Faster Recovery – Get back up and running without starting from scratch.
  • Cost-Effective Protection – Immutable backup is more affordable than you think—and far cheaper than downtime or ransom payments.

How Citynet Protects Your Business

With Citynet, you get:

  • Immutable backups as part of our managed backup and disaster recovery plans
  • Monitoring and support from our in-house West Virginia-based team
  • Flexible cloud or hybrid options to fit your business size and budget
  • Expert guidance so you’re never left wondering what’s next

Don’t Wait for a Crisis to Protect Your Data

If your current backup could be deleted, encrypted, or overwritten… it’s not enough. And when disaster strikes, it’s too late to fix it.

Immutable backup gives you the confidence to grow your business, knowing your data is secure.

Let’s make your business ransomware-ready, recovery-capable, and future-proof. 

Contact us today or call us at 1.844.CITYNET.

From Internet to Endpoint: Why One Provider for All Makes a Difference
By in ,

From Internet to Endpoint: Why One Provider for All Makes a Difference

In today’s fast-moving digital world, businesses need more than just internet connectivity; they need a technology partner who can power their entire network, protect it, and support it every step of the way.

That’s why more businesses are choosing Citynet as their all-in-one technology provider. From high-speed fiber internet to endpoint security, cloud, managed IT, and cybersecurity solutions, we simplify your tech stack and strengthen your operations without the finger-pointing that comes from juggling multiple vendors.

Here’s why choosing one trusted provider for all your connectivity and technology needs matters more than ever:

1. No More Finger-Pointing

When something goes wrong, the last thing you want is a blame game between vendors. With Citynet, you have one team accountable for it all: connectivity, cybersecurity, cloud, devices, and support. One provider. One point of contact. One answer.

2. Seamless Integration

When your internet, network security, endpoint protection, and IT services are all managed by a single provider, everything just works better. Systems are configured to work together, reducing friction and improving performance.

3. Simplified Support and Billing

Tired of managing multiple vendors, invoices, and support numbers? With Citynet, you get consolidated billing and expert 24/7 support.

4. Proactive Security and Worry-Free IT Management

Citynet protects your network from the outside in and the inside out. Our managed services are built to reduce your IT burden while enhancing security, performance, and peace of mind. Our offerings include:

  • Advanced endpoint protection
  • Proactive network monitoring
  • Security Information and Event Management (SIEM)
  • Security awareness training
  • Multi-factor authentication (MFA)
  • Patch and update management
  • Cloud backup and disaster recovery
  • Fully managed IT services and user support

Whether you’re looking to offload your entire IT infrastructure or strengthen specific areas, Citynet delivers a fully managed, worry-free IT environment designed to protect, optimize, and empower your business.

5. A Partner Invested in Your Success

Citynet isn’t just a service provider. We’re a trusted partner committed to helping businesses grow securely, efficiently, and reliably, with the infrastructure, support, and solutions to scale with you.

Simplify. Secure. Succeed.

Let’s talk about a better way to manage your business technology. Contact us today.

Top 5 Security Risks Facing SMBs and How Managed Services Mitigate Them
By in

Top 5 Security Risks Facing SMBs and How Managed Services Mitigate Them

Small and mid-sized businesses (SMBs) are increasingly becoming prime targets for cybercriminals. Why? Because many lack the in-house resources and tools to mount a strong defense. But the impact of an attack can be just as devastating for a small business as for a large enterprise—sometimes even more so.

At Citynet, we understand that protecting your business goes beyond installing antivirus software or running occasional system updates. Our Managed Services team provides the comprehensive, proactive support SMBs need to defend against today’s most dangerous security risks.

Here are five of the top cybersecurity threats SMBs face and how Citynet helps mitigate them:

Phishing Icon Blog

1. Phishing Attacks

The Risk:
Phishing emails, fake login pages, and malicious links are among the most common attack methods. These social engineering tactics aim to trick employees into giving away sensitive information or access credentials.

How Citynet Helps:
Citynet offers Security Awareness Training for your staff, empowering them to recognize and avoid phishing attempts. We also provide advanced email filtering solutions that block suspicious messages before they reach inboxes.

Ransomware Icon Blog

2. Ransomware

The Risk:
Ransomware encrypts your data and demands payment for its release. One successful infection can lock down your entire business, often leading to days (or weeks) of costly downtime.

How Citynet Helps:
Our endpoint protection and real-time monitoring solutions stop ransomware in its tracks. Plus, with automated data backup and disaster recovery, we ensure your critical data is recoverable, no ransom required.

Software Update Icon Blog

3. Unpatched Systems and Software

The Risk:
Many cyberattacks exploit known vulnerabilities in outdated operating systems, applications, or devices.

How Citynet Helps:
We handle patch management and routine software updates as part of our Managed IT Services, so your systems stay protected without lifting a finger. You’ll always be up-to-date with the latest security fixes.

Unsecured Passwords Icon Blog

4. Weak or Compromised Passwords

The Risk:
Simple or reused passwords are a goldmine for hackers using credential stuffing or brute-force attacks.

How Citynet Helps:
We implement multi-factor authentication (MFA), secure password policies, and identity management tools to lock down user access. Our solutions help enforce good security hygiene without slowing your team down.

Monitoring Icon Blog

5. Lack of Visibility and Monitoring

The Risk:
Without a clear view into your network, you may never notice unusual activity until it’s too late.

How Citynet Helps:
Our CityCare Managed Network Monitoring provides 24/7 oversight of your systems and alerts us to suspicious behavior before it becomes a major issue. We also offer vulnerability assessments to identify and fix weaknesses in your infrastructure.

Protect More Than Your Network. Protect Your Business

Cybersecurity isn’t a one-and-done task. It’s an ongoing process that requires vigilance, expertise, and the right tools. That’s where Citynet comes in.

With our comprehensive Managed Services, we protect your business from all angles so you can focus on running it.

Let’s talk about securing your success.  Contact us today to schedule a free cybersecurity consultation.

Scam Alert! Job Hunting After Graduation
By in

Scam Alert! Job Hunting After Graduation

Graduation season marks an exciting new chapter—one filled with opportunities, ambition, and the pursuit of that first big career step. But as new grads eagerly enter the job market, scammers are ready to exploit that enthusiasm.

According to the Better Business Bureau (BBB), job scams have surged in recent years, especially among people aged 18 to 34. The BBB’s latest Risk Report ranks job scams as the most dangerous type of scam for this age group, fueled in part by the rise of remote work and job hunting via online platforms.

How These Scams Work

Melanie McGovern of the BBB warns that scammers often pose as recruiters on trusted job sites like LinkedIn and Indeed. Others reach out through emails, texts, or even social media messages offering jobs that sound too good to be true—and they usually are.

“We have seen scam activity on social media sites asking people to apply for jobs or offering them jobs on the spot,” says McGovern.

Fake job listings are often vague, missing key details like job responsibilities or company information. The recruiter profiles may look suspiciously incomplete, or include profile photos that can be traced back to someone else with a quick reverse image search.

And if the “recruiter” quickly moves the conversation to a personal email (like Gmail or Yahoo) or a messaging app, that’s a red flag. “Knowing that you are dealing with a legitimate company is really, really important,” McGovern emphasizes.

Red Flags to Watch

  • Vague job descriptions or listings that are too good to be true
  • Pressure to act fast or get hired on the spot
  • Requests to pay for equipment upfront, or cash a check, and send money back
  • Use of personal email addresses instead of a corporate domain
  • Lack of a formal interview process

Legitimate employers don’t ask for money, and they don’t hire solely via text or chat apps. “Getting a professional job is a professional process,” says McGovern. “There’ll be resumes, reference checks, interviews—either in-person or virtual. That process matters.”

What You Can Do

  • Research the company and recruiter before responding
  • Don’t share personal information until you’ve verified the offer
  • Trust your instincts. If something feels off, pause and investigate
  • Report any scams to BBB Scam Tracker and the FTC at ReportFraud.ftc.gov

Graduates have worked hard to earn their degrees. Don’t let a scam be the first step in your professional journey. Stay informed, stay cautious, and you’ll be on the path to success with confidence.

Ditch the Passwords: Why Passkeys Are the Future of Online Security
By in

Ditch the Passwords: Why Passkeys Are the Future of Online Security

Tired of juggling dozens of passwords—or worse, reusing the same one across multiple sites? You’re not alone. But the good news is that passwords may soon be a thing of the past. Enter passkeys, a new, more secure way to log in that’s easier for you and harder for hackers.

What Is a Passkey?

A passkey is a digital credential that lets you sign in to websites and apps without needing a traditional password. Instead of relying on something you know (like a password), passkeys use a combination of something you have (like your phone or computer) and something you are (like a fingerprint or facial recognition).

Passkeys are based on public key cryptography, a tried-and-true method used to protect sensitive data online.

How Are Passkeys Generated?

When you create a passkey for a website or app:

  • Your device generates a key pair: a public key and a private key.
  • The public key is stored with the website or app.
  • The private key stays safely on your device and is never shared.

When you try to log in again, the website sends a challenge to your device. If your device can solve the challenge using the private key (confirmed with Face ID, Touch ID, or your device PIN), you’re in.

No password. No phishing. No problem.

The Benefits of Passkeys

  • Stronger security: Passkeys are resistant to phishing, credential stuffing, and brute-force attacks.
  • Convenience: No need to remember or manage passwords.
  • Fast sign-in: Face ID, fingerprint, or device unlock is all it takes.
  • Cross-device sync: Passkeys can sync securely across devices via services like iCloud Keychain or Google Password Manager.

The Risks of Passwords

Passwords have been the weak link in digital security for years:

  • Reused passwords make it easy for hackers to break into multiple accounts.
  • Weak passwords can be cracked by brute-force attacks.
  • Phishing scams can trick users into handing over login credentials.
  • Password databases can be stolen in data breaches, exposing millions of users.

Even with tools like password managers, the risks persist.

Are Passkeys Safe?

Yes – very safe. Because your private key never leaves your device, there’s nothing for hackers to steal or intercept. And since you don’t type anything in, there’s nothing to phish.

Major tech companies—including Apple, Google, Microsoft, and many others—are rapidly adopting passkeys as the new standard for authentication.

Can I Still use a Password if I have a Passkey?

Yes, you can still use a password, even if you have a passkey. Password managers like LastPass support both passwords and passkeys, so you have flexibility in how you access your vault.

What Should You Do Now?

  • Start using passkeys where they’re available. Many popular sites and services now support them.
  • Make sure your devices support biometric logins like fingerprint or facial recognition.
  • Use a reputable passkey manager like Apple’s iCloud Keychain or Google Password Manager to sync across your devices.

Not Ready for Passkeys? Use a Password Manager

If you’re not using passkeys yet, the next best step you can take is to use a reputable password manager, such as LastPass.

LastPass helps you:

  • Generate strong, unique passwords for every account.
  • Store them securely in an encrypted vault.
  • Automatically fill them in across devices for easy access.

Even better, LastPass now supports passkeys, allowing you to:

  • Create passkeys for compatible websites and apps.
  • Store them securely alongside your traditional passwords.
  • Use biometric authentication (like Face ID or fingerprint) to log in with ease.

It’s a seamless way to start transitioning to a more secure, password-free future, without giving up convenience.

Device Code Phishing
By in

Device Code Phishing

Don’t Fall for Device Code Phishing!

The Latest Trick from Cybercriminals

Cybercriminals never stop innovating, and their latest scam targets something you might not expect: the login process on your smart TVs, streaming devices, and even workplace tools. It’s called device code phishing, and it’s designed to trick you into handing over your login credentials through a process that looks completely legitimate.

Here’s what you need to know to stay safe.

What Is Device Code Phishing?

You’ve likely seen it before: a screen on your device that says something like,

“Visit example.com/activate and enter this code to sign in.”

This is known as a device authorization flow, and it’s a normal part of logging into apps on devices that don’t have a keyboard. It’s used by Netflix, Microsoft 365, Google, and more.

But now, attackers are copying that process to phish for your login info. Instead of a real activation page, they set up fake websites that look like the real thing, hoping you’ll enter your code and credentials.

Once you do, they instantly use those credentials on the real service to hijack your account.

How Does the Scam Work?

  1. You’re prompted with a real-looking activation screen. It may appear on a smart TV, streaming device, or even through a pop-up in a phishing email.
  2. You visit the link and enter the code. But instead of going to a real site like hulu.com/activate, you’re sent to something like hululogin-verify.com, which is a site controlled by hackers.
  3. They capture your login info. And now they have access to your streaming account, cloud tools, or even work systems.

Why It’s So Dangerous

  • It looks totally legit. These scams mimic real services and processes you trust.
  • It bypasses traditional phishing defenses. Since the actual login happens on a separate device, you might not even realize something went wrong.
  • It can lead to serious data breaches. If they get into your work or personal accounts, they may access sensitive info, financial data, or worse.

How to Protect Yourself

  • Double-check all URLs.  Legitimate activation links should be short and familiar (e.g., netflix.com/activate, not netflix-support.tv).
  • Don’t scan QR codes or follow links from unexpected sources.  Always verify directly on the device.
  • Use multi-factor authentication (MFA) such as DUO by Cisco.  Even if attackers get your password, MFA can stop them cold.
  • Stay skeptical of pop-ups.  Especially if they appear out of context or ask you to act fast.
  • Educate your family and employees.  The more people who recognize this scam, the less damage it can do.

Citynet’s Commitment to Your Security

At Citynet, we know that awareness is your first line of defense against cyber threats. That’s why we regularly share information about the latest scams and security tips, like device code phishing, on our blog and on Facebook and LinkedIn.

For businesses, we go a step further. Our CyberSuite includes powerful tools like security awareness training from KnowBe4, helping your team spot and avoid threats before they cause harm.

If your organization is ready to get serious about cybersecurity, Citynet is ready to help.