Ransomware to begin self-propagation

June 9th, 2016

2016June9_Security_BThe worrisome rise of ransomware doesn’t seem to be slowing as Microsoft recently announced the detection of self-propagating iterations of the malware. With this evolution, it is essential for SMBs to update their understanding of this security threat in order to properly protect themselves.

Are your site’s images hiding an attack?

May 17th, 2016

2016May17_Security_BUnfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

Understand these 4 types of hackers

April 28th, 2016

2016Apr28_Security_BHackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

4 BYOD security risks you should address

April 13th, 2016

2016Apr13_Security_BTaking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly.

7 Warning signs of malware infection

March 29th, 2016

2016Mar29_Security_BHas your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system.

Tips to monitor employee activities online

March 15th, 2016

2016Mar15_Security_BTo monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it a success if you go through with it.

Risks financial firms face

February 29th, 2016

2015Feb29_Security_BThe time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas.

Secure your business with these IT policies

February 9th, 2016

2016Feb9_Security_BWhen it comes to Internet security, a reported 87% of small businesses have no security policies in place at at all. And considering that employee error is one of the most common causes of an online security breach, it makes sense to have rules in place that your staff need to follow.

The true story of an SMB attacked by hackers

January 25th, 2016

2016Jan20_Security_BWhen it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely.