2604, 2017

Microsoft Word bug: What you need to know

By |April 26, 2017|Categories: Office|Tags: , , , , , , , , |

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. [...]

2404, 2017

The phishing craze that’s blindsiding users

By |April 24, 2017|Categories: Security|Tags: , , , , , |

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take [...]

2004, 2017

Why you need to back up your mobile devices

By |April 20, 2017|Categories: Business|Tags: , , , , |

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media [...]

2203, 2017

Some ransomware strains are free to decrypt

By |March 22, 2017|Categories: Security|Tags: , , , , |

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection [...]

1503, 2017

Firewalls: hardware vs. software

By |March 15, 2017|Categories: Hardware|Tags: , , , , |

Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by promises of quick and easy solutions that can be installed and managed right from your desktop. In the software vs. hardware debate, there’s a clear winner when it comes to [...]

1403, 2017

Malware on Android smartphones

By |March 14, 2017|Categories: Android|Tags: , , , , |

The average smartphone user doesn't give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone’s physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops [...]

303, 2017

Is fileless malware a threat to you?

By |March 3, 2017|Categories: Security|Tags: , , , , , |

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast [...]

2501, 2017

Fruitfly: the latest Apple malware

By |January 25, 2017|Categories: Apple|Tags: , , , , |

For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted. We’re only just [...]

1201, 2017

Cyber security and managed services

By |January 12, 2017|Categories: Security|Tags: , , , , , |

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is [...]

2812, 2016

Ransomware demands more victims for freedom

By |December 28, 2016|Categories: Security|Tags: , , , , |

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For [...]

Go to Top