1307, 2017

Why Nyetya is more threatening than WannaCry

By |July 13, 2017|Categories: Security|Tags: , , , , , , |

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, [...]

2806, 2017

Why is Windows XP getting updates?

By |June 28, 2017|Categories: Windows|Tags: , , , , , , , , , , |

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, [...]

2006, 2017

Android mobile security threats today

By |June 20, 2017|Categories: Android|Tags: , , , , , |

As bring your own device policies becomes common practice for companies today, business owners must keep in mind the possible cyber security implications of deploying more devices connected to the company network. If your employees are using Android devices, here are the top five security threats they need to be [...]

506, 2017

How HIPAA wards off ransomware threats

By |June 5, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware -- malicious software that encrypts files until the victim decides to pay the Bitcoin ransom -- took advantage of this when it hit several healthcare institutions last month. With more malware expected to target the healthcare [...]

2505, 2017

WannaCry: A historic cyberattack

By |May 25, 2017|Categories: Security|Tags: , , , , , , , , |

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the [...]

1204, 2017

Ransomware traps Skype users with fake ads

By |April 12, 2017|Categories: VoIP|Tags: , , , , , , |

Skype has made many improvements to become the go-to audio and video communication tool. But as more people turn to Skype to conduct their business, hackers are sure to follow. Recently, Skype has been plagued with fake Flash ads, which if triggered, lead to devastating ransomware infections. Read on below [...]

2203, 2017

Some ransomware strains are free to decrypt

By |March 22, 2017|Categories: Security|Tags: , , , , |

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection [...]

1201, 2017

Cyber security and managed services

By |January 12, 2017|Categories: Security|Tags: , , , , , |

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is [...]

2812, 2016

Ransomware demands more victims for freedom

By |December 28, 2016|Categories: Security|Tags: , , , , |

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For [...]

512, 2016

Old malware still poses a serious risk to EMRs

By |December 5, 2016|Categories: Healthcare|Tags: , , , , , |

Computer technology firm Symantec is warning consumers that an infamous trojan virus still targets healthcare data across the United States and around the world. This infamous piece of malware hides among image files downloaded with pirated software. Read on to learn more about the Stegoloader infection, how it might target [...]

Go to Top