If any of your business’s computers are running older versions of Windows, you need to make sure they receive a patch that fixes a vulnerability known as BlueKeep. Discover what Windows versions have this dangerous vulnerability and where you can find the patches.
The IT industry is embracing the shift from ownership-based business models to service-based ones. Vendors are increasingly offering their hardware, software, and other IT products as cloud services rather than selling the products themselves. … Read More
Pinchy Spider and GandCrab sound like scoundrels in a super-hero comic book, but they are real-life villains in the business world. Learn how to defend your company against the Pinchy Spider hacking group’s latest tactics and its newest version of the GandCrab ransomware. … Read More
Regulations that protect people’s privacy and data rights are becoming more common — and so are the myths about complying with them. Here are four myths debunked. … Read More
A serious security vulnerability dubbed Doomsday Docker has been discovered. If your business uses containers, here is what you need to know. … Read More
In November 2017, hackers sent out spear phishing emails specifically targeting employees who handled their companies’ finances. To trick the employees into falling for the scam, they made the emails appear to be from trusted business associates. Learn more about this spear phishing attack and how to protect your business from this type of scam.
If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it will go global. How the Attack Works Hackers like to target HR … Read More
The popularity of mobile devices has increased substantially in recent years. According to the latest numbers from eMarketer, approximately 25% of the world’s population uses smartphones. That number is expected to rise in the next few years. Hackers have begun to notice this trend, and so it is no surprise that many are now focusing their efforts on mobile device … Read More
How much is your business willing to pay if a cybercriminal holds your data ransom? Cybercriminals are devising new ways to obtain your data. Up until this year, these cybercriminals relied on unsuspecting users to open a phishing email as a means to install ransomware. Today, cybercriminals have devised a new mode of attack – using unpatched servers as … Read More
Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant’s customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple’s mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in the devices’ built-in apps. Plus, … Read More
Almost 90 percent of Android smartphones are vulnerable to malware, according to a 2015 study. It is not because of something that their owners are doing or not doing. Rather, these phones are vulnerable because they have not received regular security updates. The study found that Android devices receive only 1.26 updates per year on average, even though Google issues … Read More
Before getting rid of an old computer, you need to make sure that all the personal and sensitive data on the hard drive is irretrievable. If personal or sensitive data falls into the wrong hands, your business could incur staggering direct and indirect expenses. The average total cost of a data breach in 2015 was $3.8 million, according to the … Read More
Back in my day, a good antivirus (AV) product was all you needed to protect a network. Patches were mostly bug fixes, and the Internet was relatively safe. High-speed Internet changed everything. Back in the days of dial up, the bandwidth did not exist to provide a cybercriminal with decent access to your network. The connection wasn’t 24/7 either. Users … Read More