108, 2016

Set your ransomed files free, for free

By |August 1, 2016|Categories: Security|Tags: , , , , |

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have developed ways to infiltrate your company's network and systems, take your confidential data hostage, and unlawfully encrypt it. Pay them a ransom and you [...]

1407, 2016

5 simple but manageable security measures

By |July 14, 2016|Categories: Security|Tags: , , , , , |

Don't be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that's often far too complicated [...]

507, 2016

WordPress 4.5.3 fixes several security bugs

By |July 5, 2016|Categories: Security|Tags: , , , , , , , |

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to [...]

2006, 2016

Spoofed email takes down NBA team

By |June 20, 2016|Categories: Security|Tags: , , , , , , |

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a [...]

906, 2016

Ransomware adopting self-replication

By |June 9, 2016|Categories: Security|Tags: , , , , , , |

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital [...]

1705, 2016

New security flaw in popular image uploader

By |May 17, 2016|Categories: Security|Tags: , , , , , , |

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a [...]

2804, 2016

Different types of hackers defined

By |April 28, 2016|Categories: Security|Tags: , , , , , , , , |

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll [...]

1304, 2016

How is BYOD a security risk?

By |April 13, 2016|Categories: Security|Tags: , , , , , , , |

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your [...]

2903, 2016

How to find out if your computer has a virus

By |March 29, 2016|Categories: Security|Tags: , , , , , , , , , |

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this [...]

1503, 2016

Monitoring employees online. Is it right?

By |March 15, 2016|Categories: Security|Tags: , , , , , , , , , |

Whether or not to monitor your employees' computers can be a tricky decision. While part of you may think it’s unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process. So, should you monitor? Here [...]

Go to Top