709, 2018

5 Cybersecurity measures anyone can master

By |September 7, 2018|Categories: Security|Tags: , , , , , , , , |

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one [...]

2308, 2018

4 Security risks of the BYOD strategy

By |August 23, 2018|Categories: Security|Tags: , , , , , , |

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to [...]

708, 2018

Spectre makes a comeback

By |August 7, 2018|Categories: Security|Tags: , , , , , , , , |

When one cyberattack is stopped, another more powerful variant almost always takes its place. It happens all the time with ransomware, computer viruses, and Trojan horses. Recently, this has become the case with Spectre attacks, which exploit a fundamental flaw in modern computer chips. Here’s everything you need to know. [...]

2307, 2018

IT policies to protect your business

By |July 23, 2018|Categories: Security|Tags: , , , , , , , |

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. [...]

507, 2018

Consider the security risks of your software

By |July 5, 2018|Categories: Security|Tags: , , , , , , , , |

Cybersecurity is an issue that hounds businesses of all types. Sometimes organizations invest in security software without realizing the risks that come with it. Here’s why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should evaluate the current state of its cybersecurity by running [...]

2006, 2018

Router malware worse than experts realize

By |June 20, 2018|Categories: Security|Tags: , , , , , , , , |

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter [...]

1406, 2018

Chrome to mark HTTP as ‘not secure’

By |June 14, 2018|Categories: Google, Security, Web & Cloud|Tags: , , , , , , , , , , , , , |

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several [...]

606, 2018

Flash to be stopped in Office 365

By |June 6, 2018|Categories: Office, Security|Tags: , , , , , , , |

If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be a thing of the past. Over a week ago, Microsoft announced that Office 365 would completely block said media by January 2019. Microsoft recently announced [...]

506, 2018

How to defend against insider threats

By |June 5, 2018|Categories: Healthcare, Security|Tags: , , , , , |

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate - [...]

106, 2018

Malware hits 500k IoT devices, Talos reports

By |June 1, 2018|Categories: Security|Tags: , , , , , , , , |

A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected by new malware called VPNFilter. An earlier version, believed to be launched by a nation-state, targeted Ukraine. How VPNFilter Works Talos cited the vulnerable devices [...]

Go to Top