Poole Technology Solutions

Quishing: The Rising QR Code Threat Businesses and Consumers Must Understand

QR codes have become a convenient part of everyday life, but cybercriminals are now exploiting them through a growing threat known as quishing. This form of social engineering hides malicious links inside QR codes delivered through emails, text messages, and even physical advertisements. Learn how quishing attacks work, what warning signs to look for, and the steps businesses and individuals can take to reduce the risk.

Cybercriminals Love the Holidays: How to Protect Yourself and Your Business

Holiday scammers take advantage of the busy season by launching targeted email, text, and domain impersonation attacks. From fake delivery alerts to TOAD schemes and look-alike domains, both consumers and businesses face heightened risk. This guide explains the latest threats and practical steps to stay protected during the holidays.

Google Tightens Bulk Sender Rules: Are You Ready?

Gmail’s new bulk sender rules are reshaping email marketing and deliverability. Starting November 2025, senders must align SPF and DKIM, publish DMARC, and maintain complaint rates below 0.3 %. At Poole Technology Solutions, we help businesses prepare now to ensure compliance and protect their brand reputation.

NIST CSF 2.0 for Small Teams: A 30-Day Quick Start Guide

Cybersecurity doesn’t have to be complex to be effective. NIST CSF 2.0 gives small and mid-sized organizations a practical blueprint for identifying risks, protecting systems, and building long-term resilience. In this 30-day quick start, Poole Technology Solutions shows how to turn framework goals into achievable, real-world action.