Nearly 1 Million Windows Computers Have Serious Vulnerability

June 11, 2019

If any of your business’s computers are running older versions of Windows, you need to make sure they receive a patch that fixes a vulnerability known as BlueKeep. Discover what Windows versions have this dangerous vulnerability and where you can find the patches.

SaaS, IaaS, and PaaS: What’s the Difference?

May 30, 2019

The IT industry is embracing the shift from ownership-based business models to service-based ones. Vendors are increasingly offering their hardware, software, and other IT products as cloud services rather than selling the products themselves. … Read More

New Ransomware Is Masquerading as Apps and Games

February 2, 2019

Anatova has gained security experts’ attention. Besides being the first new ransomware in 2019, it poses a serious threat. Discover why it is so dangerous and how to protect your business from it.

Thousands of WordPress Websites Hijacked

October 8, 2018

Cybercriminals hijacked thousands of WordPress websites in September 2018. Learn how hackers carried out these attacks and what you can do to protect your business’s website.

The 5 Most Costly Types of IT-Related Cybercrimes

July 3, 2018

A report issued by the Internet Crime Complaint Center shows that cybercrime victims lost more than $1 billion in 2017. Here are the top five IT-related cybercrimes that cost businesses and individuals the most amount of money.

These Password Recommendations Might Surprise You

May 5, 2018

The US National Institute of Standards and Technology (NIST) has some surprising recommendations that might prompt you to rethink your business’s password policies. Learn why change is needed and what NIST is recommending that companies do.

Business Email Scams Are on the Rise

April 17, 2018

Sophisticated email scams designed to con companies out of money and sensitive data are on the rise. Learn how to avoid falling victim to these scams.

SamSam Is on the Loose and Headed for a Server Near You

April 6, 2018

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Hackers Are Masquerading as Trusted Business Contacts

February 2, 2018

In November 2017, hackers sent out spear phishing emails specifically targeting employees who handled their companies’ finances. To trick the employees into falling for the scam, they made the emails appear to be from trusted business associates. Learn more about this spear phishing attack and how to protect your business from this type of scam.

Cybercriminals Are Posing as Job Applicants to Spread Ransomware

April 19, 2017

If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it will go global. How the Attack Works Hackers like to target HR … Read More

4 Trending Threats to Your Mobile Security

October 7, 2016

The popularity of mobile devices has increased substantially in recent years. According to the latest numbers from eMarketer, approximately 25% of the world’s population uses smartphones. That number is expected to rise in the next few years. Hackers have begun to notice this trend, and so it is no surprise that many are now focusing their efforts on mobile device … Read More

Hackers Are Exploiting Server Vulnerabilities to Spread Ransomware

July 21, 2016

How much is your business willing to pay if a cybercriminal holds your data ransom?   Cybercriminals are devising new ways to obtain your data. Up until this year, these cybercriminals relied on unsuspecting users to open a phishing email as a means to install ransomware.  Today, cybercriminals have devised a new mode of attack –  using unpatched servers as … Read More

How to Protect iPhones and iPads from Cyberattacks

May 31, 2016

Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant’s customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple’s mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in the devices’ built-in apps. Plus, … Read More

Nearly 90 Percent of Android Smartphones Are Vulnerable to Malware

April 15, 2016

Almost 90 percent of Android smartphones are vulnerable to malware, according to a 2015 study. It is not because of something that their owners are doing or not doing. Rather, these phones are vulnerable because they have not received regular security updates. The study found that Android devices receive only 1.26 updates per year on average, even though Google issues … Read More

The Right and Wrong Ways to Get Rid of Old Computers

March 16, 2016

Before getting rid of an old computer, you need to make sure that all the personal and sensitive data on the hard drive is irretrievable. If personal or sensitive data falls into the wrong hands, your business could incur staggering direct and indirect expenses. The average total cost of a data breach in 2015 was $3.8 million, according to the … Read More

Layered Security: High-Speed Internet Changed Everything

February 5, 2016

Back in my day, a good antivirus (AV) product was all you needed to protect a network. Patches were mostly bug fixes, and the Internet was relatively safe. High-speed Internet changed everything. Back in the days of dial up, the bandwidth did not exist to provide a cybercriminal with decent access to your network. The connection wasn’t 24/7 either. Users … Read More