Fileless Malware: Who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. But don’t panic! Getting acquainted with this new malware today could save you from a headache in the future.

What is this new threat?

To oversimplify the matter, fileless malware is stored somewhere other […]

By | 2018-05-28T10:23:58+00:00 March 3rd, 2017|Security|Comments Off on Fileless Malware: Who are the targets?

Hackers Can Use Autofill to Get Your Credit Card Info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases […]

By | 2018-05-29T05:37:56+00:00 January 27th, 2017|Business Value, Security|Comments Off on Hackers Can Use Autofill to Get Your Credit Card Info

New Year, New Cyber Threats

Have you had to deal with security issues in the past year? Brace yourself; there are more to come. For this reason, security experts have become indispensable to businesses. They guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood. As you ring in the […]

By | 2018-05-29T05:42:55+00:00 December 13th, 2016|Business Value, Cloud Services, SaaS, Security|Comments Off on New Year, New Cyber Threats

What Is Managed Firewall and How Does it Work?

Let’s start with the basics: do you know the difference between a firewall and managed firewallopens in a new window? You probably have some idea of what a firewall is and what it does. A firewall is part of your computer system or network that is designed to block unauthorized access […]

By | 2018-05-29T05:44:29+00:00 December 6th, 2016|Business Continuity, Security|Comments Off on What Is Managed Firewall and How Does it Work?

Did You Know? 2-Step and 2-Factor Authentication Are Not the Same Thing!

With all the recent hacking scares all over the world, you know and understand that your business’s cyber-security is extremely important.

If you are seeking out a way to improve your business’s cyber-security, both for your business itself as well as for your customers, you are likely looking at your authentication […]

By | 2016-10-25T15:00:31+00:00 October 25th, 2016|Business Intelligence, Security|Comments Off on Did You Know? 2-Step and 2-Factor Authentication Are Not the Same Thing!

Cyber-crime and Social Engineering: Don’t Be a Victim

For as long as there have been cybercriminals, there have been social engineers, or people who use tricks and scams to force other people to volunteer sensitive information. There are several ways to use social engineering to acquire valuable information like account passwords and bank accounts, but avoiding these scams […]

By | 2016-10-07T15:00:50+00:00 October 7th, 2016|Security|Comments Off on Cyber-crime and Social Engineering: Don’t Be a Victim

9 Cybersecurity Terms Everyone Should Know

Here’s a refresher on all the latest buzzwords used in the cybersecurity sector.

Malware

For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm computers and networks. A virus is actually a specific type of malware designed to replicate […]

By | 2016-09-26T12:00:47+00:00 September 26th, 2016|Business Value, Security|Comments Off on 9 Cybersecurity Terms Everyone Should Know

Game Over: NBA team loses valuable data due to poor email security

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every direction. The Milwaukee Bucks on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, social security numbers, compensation […]

By | 2016-06-20T20:00:56+00:00 June 20th, 2016|Business Value, Security|Comments Off on Game Over: NBA team loses valuable data due to poor email security

Ransomware Will Begin Self-Propagating

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat […]

By | 2016-06-14T08:00:25+00:00 June 14th, 2016|Business Value, Security|Comments Off on Ransomware Will Begin Self-Propagating

Are Your Site’s Images Hiding an Attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. […]

By | 2016-05-17T20:00:03+00:00 May 17th, 2016|Business Value, Security, Trending in Tech|Comments Off on Are Your Site’s Images Hiding an Attack?