Protect your Facebook and Twitter from hackers

Posted on Friday April 23, 2021  |  twitter, facebook, apps, security, android, ios, privacy, settings, login, multifactor authentication

Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media.

 

How to protect your Android device from ransomware

Posted on Wednesday April 21, 2021  |  android, data backup, ransomware, android devices, cybersecurity, mobile ransomware, android ransomware

Over the past few years, ransomware has become increasingly widespread and sophisticated. This form of malware has even spread to Android smartphones and tablets, putting organizations that rely on mobile devices at risk of data loss and other productivity-crippling problems. Read on to learn how mobile ransomware works and how you can safeguard your Android devices as well as your business against this threat.

 

AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities

Posted on Tuesday April 20, 2021

date: April 20, 2021 | Last revised: May 28, 2021

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting a number of U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020 or earlier related to vulnerabilities in certain Ivanti Pulse Connect Secure products. Since March 31, 2021, CISA and Ivanti have assisted multiple entities whose vulnerable Pulse Connect Secure products have been exploited by a cyber threat actor. These entities confirmed the malicious activity after running the Pulse Secure Connect Integrity Tool. To gain initial access, the threat actor is leveraging multiple vulnerabilities, including CVE-2019-11510, CVE-2020-8260, CVE-2020-8243, and the newly disclosed CVE-2021-22893. The threat actor is using this access to place webshells on the Pulse Connect Secure appliance for further access and persistence. The known webshells allow for a variety of functions, including authentication bypass, multi-factor authentication bypass, password logging, and persistence through patching.

 

Why an SSD is better than an HDD for your Mac

Posted on Monday April 19, 2021  |  apple, mac, hdd, ssd, hard disk drives, solid state drives, flash memory, data storage, storage devices

There’s no question that solid state drives (SSDs) are better than hard disk drives (HDDs) for personal computers and Macs. SSDs will significantly enhance your machines’ performance in ways you may not have imagined. Here are a few specific benefits to Mac when you replace HDDs with SSDs.

 

Replacing servers? Consider these 3 questions first

Posted on Friday April 16, 2021  |  business, hardware, virtualization, servers, planning, company, replacement

Nothing lasts forever — and that’s very true for your company’s servers. Purchasing new ones, however, isn’t your only option. Instead of buying new servers, you can leverage solutions that offer the same outcomes while saving you a lot of money.

 

How SMBs can prevent VoIP eavesdropping

Posted on Wednesday April 14, 2021  |  sme, prevention, voip, smb, cybercrime, threat, eavesdropping

As a business owner, you should be aware of the different cyberattacks that can hurt your company. One of these is Voice over Internet Protocol (VoIP) eavesdropping. This occurs when cybercriminals infiltrate your VoIP network and listen in on your calls in hopes of stealing critical business information. To prevent this, you should implement the proper defenses for your VoIP phone systems.

 

Page:   1...767778798081828384...314

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016