506, 2018

How to defend against insider threats

By |June 5, 2018|Categories: Healthcare, Security|Tags: , , , , , |

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents. #1 Educate - [...]

1303, 2018

Government agency finds way to unlock iPhones

By |March 13, 2018|Categories: Apple|Tags: , , , , , , , , , |

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they've found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers. iPhone [...]

2202, 2018

Are hackers using your PC to mine Bitcoin?

By |February 22, 2018|Categories: Hardware|Tags: , , , , , , , , |

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your [...]

202, 2018

Fighting ransomware with virtualization

By |February 2, 2018|Categories: Business|Tags: , , , , , , |

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with [...]

2201, 2018

Data safety: The non-technical way

By |January 22, 2018|Categories: Hardware|Tags: , , , , , , |

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us! Cover up your webcam There must be [...]

901, 2018

Think before saving logins to your browser

By |January 9, 2018|Categories: Security|Tags: , , , , , , , , |

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your [...]

201, 2018

Big gains for small-business IT in 2017

By |January 2, 2018|Categories: Business|Tags: , , , , , , , , |

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our [...]

612, 2017

Cybersecurity Essentials: VPN

By |December 6, 2017|Categories: Security|Tags: , , , , , , , |

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, [...]

610, 2017

Who are the ShadowBrokers?

By |October 6, 2017|Categories: Windows|Tags: , , , , , , , |

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to [...]

310, 2017

What you can learn from Equifax’s leak

By |October 3, 2017|Categories: Security|Tags: , , , , , |

When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn't experience the same fate as the giant, bumbling credit bureau. [...]

Go to Top