1407, 2017

How Windows 10 plans to defeat ransomware

By |July 14, 2017|Categories: Windows|Tags: , , , , , , , , |

The recent WannaCry and Petya ransomware attacks have caused massive disruptions for Windows users. Although ransomware infection has slowed down in the past few weeks, many experts are saying that this is only just the beginning. Soon, newer and far more dangerous strains of malware will be developed. To help [...]

407, 2017

The benefits of virtualization in 2017

By |July 4, 2017|Categories: Virtualization|Tags: , , , , , , , |

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship far more flexible, and we’ve got a rundown on a few of the best examples. More technology uptime Virtualization vendors use lots of [...]

307, 2017

Google ridding MR from search results

By |July 3, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual's medical records were [...]

2706, 2017

Wikileaks details router vulnerabilities

By |June 27, 2017|Categories: Security|Tags: , , , , , , , |

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently [...]

1906, 2017

Google adds anti-phishing features on Gmail

By |June 19, 2017|Categories: Google|Tags: , , , , , , , , , |

Cybercriminals have been relentless throughout 2017. In the past couple of months, hackers discovered new malware strains and software vulnerabilities that have overwhelmed thousands of businesses worldwide. But despite these new attacks, hackers still have an old, yet effective trick up their sleeves: phishing scams. To this day, sending fraudulent [...]

906, 2017

Basic PC fixes are costing you money

By |June 9, 2017|Categories: Security|Tags: , , , , |

When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of everyone’s time. After all, employees must have working computers and IT professionals are expected to resolve any technology issues. What doesn’t get acknowledged, however, is that [...]

806, 2017

6 Mac security tips and tricks

By |June 8, 2017|Categories: Apple|Tags: , , , , , , , , , , |

Although well aware of its importance, users still overlook Mac security. This might be excusable if you’re using your device just to watch cooking shows or to experiment with PhotoBooth, but not if it’s being used in day-to-day business operations. Deter internal and external threats from compromising your device with [...]

506, 2017

How HIPAA wards off ransomware threats

By |June 5, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware -- malicious software that encrypts files until the victim decides to pay the Bitcoin ransom -- took advantage of this when it hit several healthcare institutions last month. With more malware expected to target the healthcare [...]

2305, 2017

How to defend against WannaCry

By |May 23, 2017|Categories: Business|Tags: , , , , , , , , |

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release. What’s worse, more WannaCry variants will likely be developed in [...]

1805, 2017

New phishing protection for Gmail on Android

By |May 18, 2017|Categories: Android|Tags: , , , , , , , , |

One of the most common ways hackers infiltrate networks is by using phishing scams -- fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method. To blunt the potency [...]

Go to Top