Fileless malware: who are the targets?

March 3rd, 2017
Fileless malware: who are the targets?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary.

5 great ways to prevent cyber-attacks

February 15th, 2017
5 great ways to prevent cyber-attacks

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content.

Hackers use browsers to get credit card info

January 27th, 2017
Hackers use browsers to get credit card info

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time.

Statistics for cyber security during 2016

January 12th, 2017
Statistics for cyber security during 2016

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle.

The ransomware that makes you sell your soul

December 28th, 2016
The ransomware that makes you sell your soul

It’s scary to think you can be simply browsing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there’s a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely.

New year, new cyber-threats

December 13th, 2016
New year, new cyber-threats

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.

Easy tips for preventing a costly data breach

November 25th, 2016
Easy tips for preventing a costly data breach

As long as businesses host valuable data, cyber criminals will continue to bypass the security protocols meant to protect this data. The causes of security breaches range from device theft or loss, weak and stolen credentials, malware, and outdated systems that use ineffective security measures.

Youth: the real tech-scam victims

November 10th, 2016
Youth: the real tech-scam victims

As long as there have been salesmen, there have been scammers trying to sell useless products. Traditionally the elderly have fallen prey to cold-call fraud, but now scam artists are getting tech-smart, and it’s the younger generation of computer users who are falling for scams.

Is two-step authentication the only way?

October 25th, 2016
Is two-step authentication the only way?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people.

Cyber-crime and social engineering

October 7th, 2016
Cyber-crime and social engineering

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.