Sly phishing attack catching users off guard

April 24th, 2017
Sly phishing attack catching users off guard

So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up.

Wikileaks’ charges of government spying

April 6th, 2017
Wikileaks’ charges of government spying

Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation of compromised devices and applications. But in today’s climate, every headline needs to be taken with a grain of salt.

No Ransom: a place for free decryption

March 22nd, 2017
No Ransom: a place for free decryption

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands.

Fileless malware: who are the targets?

March 3rd, 2017
Fileless malware: who are the targets?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary.

5 great ways to prevent cyber-attacks

February 15th, 2017
5 great ways to prevent cyber-attacks

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content.

Hackers use browsers to get credit card info

January 27th, 2017
Hackers use browsers to get credit card info

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time.

Statistics for cyber security during 2016

January 12th, 2017
Statistics for cyber security during 2016

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle.

The ransomware that makes you sell your soul

December 28th, 2016
The ransomware that makes you sell your soul

It’s scary to think you can be simply browsing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there’s a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely.

New year, new cyber-threats

December 13th, 2016
New year, new cyber-threats

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.

Easy tips for preventing a costly data breach

November 25th, 2016
Easy tips for preventing a costly data breach

As long as businesses host valuable data, cyber criminals will continue to bypass the security protocols meant to protect this data. The causes of security breaches range from device theft or loss, weak and stolen credentials, malware, and outdated systems that use ineffective security measures.