Tag Search: cyberattack

The 5 types of hackers who want to harm your business

Posted on Wednesday June 02, 2021  |  security, hackers, edward snowden, smb, hacktivist, insider, script kiddie, cyberattack, cybercriminal, iloveyou, state sponsored hackers

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won't be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of malicious hackers and the motives behind their activities.

 

A primer on watering hole attacks

Posted on Tuesday July 30, 2019  |  security, vpn, update, intrusion prevention system, cyberattack, watering hole attack

Cyberattacks come in many different forms, with new methods being developed all the time. What's bad is that personal information is now often stored online, be it through social media or through government and healthcare services - and these are juicy targets for criminals. Learn more about one way these criminals steal data - through watering hole attacks.

 

New Office 365 cyberattack on the loose

Posted on Monday August 27, 2018  |  sharepoint, security, scams, phishing, outlook, office 365, microsoft, cyberattack

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It's a three-step attack that's easy to avoid if you know how it works.

 

Beware of watering hole attacks!

Posted on Tuesday April 17, 2018  |  watering hole attack, vpn, update, security, intrusion prevention system, cyberattack

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

 

Page:   1

Celebrating 30 Years

Off-Site Cloud Backups

Contact Us

Microsoft Windows 7/Windows Server 2008/Office 2010 - End of Life