top of page

CROSSREALMS

CrossRelams is a Chicago IT company

I worked as a Marketing Specialist at CrossRealms from Fall '18 to Spring '19

​

I began working at CrossRealms as a Marketing Intern, but grew to a Marketing Specialist. I worked closely with the CEO and Principal Enterprise Architect, creating B2B marketing campaigns encompassing email, social media, and event planning. 

CR Logo .png
Chicago, IL

Campaigns

Images below were sent out as email campaigns, please click on the image to view the landing page created for the campaigns.

CAMPAIGNS CAMPAIGNS

CR X Cohesity X PureStorage

Business Continuity 

Campaign 

​

Click to View Landing Page 

CR X SOPHOS

Full Attendance 

Successful Campaign 

​

Click to View Landing Page 

Articles

Articles are all written by me. 

Images are all designed by me. 

Artboard-1Malware-3.png

Amidst a news cycle rife with malware incidents and cyberattacks, there is one shining spot of hope: 100,000 malware sites have been reported and taken down within the last year...

This-is-a-fake-Gmail-copy-1.png

This new phishing attack has gained a level of sophistication that will trick even a trained user. An unpatched URL vulnerability allows a hacker to imitate a website address and then acquire information through a fake login portal....

Artboard 1Article Image 1.png

We all know about email phishing, it’s relatively easy to spot. When the prince of Nigeria emails asking for help, we know not respond with our banking info, but when your I.T. provider “emails” with a link to click to login, this might be a little harder to recognize as an attack. Spear phishing is […]

microsoft-02.jpg

Microsoft JET, a database engine, is currently a massive vulnerability. A recent repair has yet to repair a long-standing flaw, leaving an opening for hackers. JET is one of Microsoft’s first database engines, created in the 90’s, used to power a variety of Microsoft applications like: Microsoft Project, Visual Basic, an Access. It has since […]

G-Redo-03.png

In response to a publicized security breach, Google is looking to shut down their failed social media site. Google+ was created with the intention of overthrowing Facebook, but instead has left its scanty user base exposed to third-party data intrusions via software bug. How Data Was Compromised Destined to be a popular site, Google+ was […]

Artboard 2Article Image 2.png

Can my wi-fi router be compromised? Wi-Fi routers pose an easy target for most hackers. A router’s firmware will pose a risk if left running without an update. Most households will keep their Wi-Fi router running day in and day out, without being checked for the latest patches or bug fixes. Over time, Wi-Fi routers’ […]

3CX-02.png

This past month one of our clients experienced a security compromise with their phone system, where 3 extensions had their credentials swiped. Among the information taken was the remote phone login information, including username, extension and password for their 3CX phone system. Our first tip off of the attack was the mass amount of international […]

bottom of page