1902, 2019

Fileless malware: Are you at risk?

By |February 19, 2019|Categories: Security|Tags: , , , , , |

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays [...]

3101, 2019

Are autocomplete passwords safe?

By |January 31, 2019|Categories: Security|Tags: , , , , , , , , , , |

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December [...]

801, 2019

VPNs: Why you need them

By |January 8, 2019|Categories: Security|Tags: , , , , , , , |

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is a VPN? [...]

2811, 2018

Not all hackers are cybercriminals

By |November 28, 2018|Categories: Security|Tags: , , , , , |

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, [...]

1311, 2018

The lowdown on cloud security

By |November 13, 2018|Categories: Security|Tags: , , , , , , |

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly [...]

2610, 2018

Is your IT security proactive?

By |October 26, 2018|Categories: Security|Tags: , , , , , |

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you [...]

2510, 2018

Secure your Mac computer in 6 easy ways

By |October 25, 2018|Categories: Apple, Security|Tags: , , , , , , , , , , |

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips.  The basics First, let’s start [...]

1110, 2018

4 types of hackers that may target SMBs

By |October 11, 2018|Categories: Security|Tags: , , , , , , , , |

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need [...]

2509, 2018

Don’t let hackers fool you with these tricks

By |September 25, 2018|Categories: Security|Tags: , , , , , , , |

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing [...]

Go to Top