2804, 2017

What is virtual “sandboxing”?

By |April 28, 2017|Categories: Virtualization|Tags: , , , , , |

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it’s worth learning about. What is sandboxing? Sandboxing is one of [...]

2404, 2017

The phishing craze that’s blindsiding users

By |April 24, 2017|Categories: Security|Tags: , , , , , |

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take [...]

604, 2017

Is the government really spying on you?

By |April 6, 2017|Categories: Security|Tags: , , , , , , , , |

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and...TVs? Let’s see just how worrisome they really are. What devices and [...]

2203, 2017

Some ransomware strains are free to decrypt

By |March 22, 2017|Categories: Security|Tags: , , , , |

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection [...]

2103, 2017

How to recover from ransomware in your Mac

By |March 21, 2017|Categories: Apple|Tags: , , , , , , , , |

While a vast majority of ransomware that’s been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new ransomware strain, OSX/Filecoder.E, which encrypts Mac files and keeps them locked even after the victims have paid the ransom. But don’t worry, there is still [...]

1503, 2017

Firewalls: hardware vs. software

By |March 15, 2017|Categories: Hardware|Tags: , , , , |

Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by promises of quick and easy solutions that can be installed and managed right from your desktop. In the software vs. hardware debate, there’s a clear winner when it comes to [...]

303, 2017

Is fileless malware a threat to you?

By |March 3, 2017|Categories: Security|Tags: , , , , , |

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast [...]

1502, 2017

What exactly is preventive cyber-security?

By |February 15, 2017|Categories: Security|Tags: , , , , , |

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive [...]

2501, 2017

Fruitfly: the latest Apple malware

By |January 25, 2017|Categories: Apple|Tags: , , , , |

For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted. We’re only just [...]

1201, 2017

Cyber security and managed services

By |January 12, 2017|Categories: Security|Tags: , , , , , |

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is [...]

Go to Top