Infected with Ransomware? Don’t Panic Just Yet.

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the more it spreads, the more resources are allocated to fighting it. If your data is held hostage, check these lists for free decryption tools first!

The state of […]

By | 2018-05-29T05:27:17+00:00 March 22nd, 2017|Business Value, Security|Comments Off on Infected with Ransomware? Don’t Panic Just Yet.

Hackers Can Use Autofill to Get Your Credit Card Info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases […]

By | 2018-05-29T05:37:56+00:00 January 27th, 2017|Business Value, Security|Comments Off on Hackers Can Use Autofill to Get Your Credit Card Info

Ransomware Will Begin Self-Propagating

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat […]

By | 2016-06-14T08:00:25+00:00 June 14th, 2016|Business Value, Security|Comments Off on Ransomware Will Begin Self-Propagating

Can You Name 4 Types of Hackers?

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about how a cyber attack takes place and its effect on the business. But knowing the motive behind a hacker’s attack can help you understand whether or […]

By | 2018-05-29T06:03:44+00:00 April 28th, 2016|Business Intelligence, Business Value, Security, Trending in Tech|Comments Off on Can You Name 4 Types of Hackers?

4 BYOD Security Risks You Need to Know

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home. And, with a bring your own device (BYOD) strategy, businesses have never been so productive. […]

By | 2016-04-13T20:00:59+00:00 April 13th, 2016|Security|Comments Off on 4 BYOD Security Risks You Need to Know

The true story of an SMB attacked by hackers

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times recently ran an article telling the story of a small business, just like you, who suffered a major cyber attack. Here’s the story, and some ideas as to how to protect your business.

By | 2018-05-23T10:36:56+00:00 January 25th, 2016|Security|Comments Off on The true story of an SMB attacked by hackers