2511, 2016

Five tips to avoid a security breach

By |November 25, 2016|Categories: Security|Tags: , , , |

If you’ve read this blog before, you already know security is paramount to the success of any small business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, devices and networks have been illegally [...]

2311, 2016

IoT scanner detects at-risk “Smart Devices”

By |November 23, 2016|Categories: Hardware|Tags: , , , |

After the recent Dyn attack that took Netflix and other major websites down, business owners are vigilant about ensuring the security of their network and devices connected to the “Internet of Things” (IoT). A new scanner from Bullguard promises to warn owners of potential entry points for hackers. Keep reading [...]

1011, 2016

Young workers are more gullible to tech scams

By |November 10, 2016|Categories: Security|Tags: , , , |

The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they're taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists [...]

2410, 2016

Denial of service attacks on VoIP systems

By |October 24, 2016|Categories: VoIP|Tags: , , , , , |

When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the [...]

710, 2016

Social engineering and cyber security

By |October 7, 2016|Categories: Security|Tags: , , , , |

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often [...]

709, 2016

Fantom: the latest cybersecurity spectre

By |September 7, 2016|Categories: Windows|Tags: , , , , , , , , , , , , , |

It’s hard to deny how quickly the different types of ransomware multiply -- they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would [...]

1407, 2016

5 simple but manageable security measures

By |July 14, 2016|Categories: Security|Tags: , , , , , |

Don't be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that's often far too complicated [...]

1101, 2016

Healthcare trends to watch for in 2016

By |January 11, 2016|Categories: Healthcare & EMR General|Tags: , , , , , , , , |

As 2015 came to a close, there are several trends in the healthcare industry that medical researchers and practitioners need to be aware of in 2016. According to PwC Health Research Institute, patients will be on the lookout for better ways to manage their health and medical expenses. Technology is [...]

1812, 2015

Twitter warns about cyber attacks

By |December 18, 2015|Categories: Security|Tags: , , , , , , |

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook [...]

Go to Top