Tag Search: cybersecurity

Here's what to look for when buying antivirus software

Posted on Friday May 01, 2020  |  security, protection, software, antivirus, cybersecurity, devices, cyberthreats

Because of the global pandemic, work from home is now a necessity. This has increased the potential entry points for cybercriminals to infiltrate your network. Now more than ever, businesses need better cybersecurity protection. That's why it's important to choose the right antivirus software for your needs. If you're in the market for one, consider the following points.

 

How to know if your VoIP system is being hacked

Posted on Wednesday April 22, 2020  |  voip, cybersecurity, voip network, voip security, voip system

Most businesses today have made the switch from the traditional landline telephone system to a Voice over Internet Protocol (VoIP) system. This is because VoIP offers more benefits including cost reduction, mobility, and scalability. But just like any device that's connected to the internet, VoIP phones can be targeted by hackers who want to steal valuable information. Here are some of the ways to tell if your VoIP system is being hacked.

 

How to work from home securely

Posted on Friday April 10, 2020  |  password, data backup, vpn, antivirus, phishing, firewall, cybersecurity, multifactor authentication, remote work, online scam, wi fi router

Encouraging staff to work from home is extremely vital in the midst of the COVID-19 outbreak. By minimizing social interactions and contact risks, you can reduce the spread of the virus. But be warned. Transitioning from a fully managed business environment to a home office can leave you vulnerable to cyberattacks and online scams. Here's what you and your staff must do to mitigate the cybersecurity risks.

 

Why autocomplete passwords are risky

Posted on Friday March 20, 2020  |  firefox, safari, security, web browsers, privacy, chrome, passwords, auto fill, cybersecurity, general articles c

Many people use auto-fill passwords for their convenience. What you might not know is that hackers and advertisers can use them to get access to websites and other applications and gather sensitive information. Learn more about the risks of using autocomplete passwords.

 

3 Hacker types you need to know about

Posted on Monday March 02, 2020  |  hacking, black hat, cybersecurity, gray hat, white hat

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who executes a vulnerability test and presents their findings to software vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.

 

What you need to know about VoIP phishing

Posted on Friday February 21, 2020  |  voip, phishing, cybersecurity, vishing scam, business communication, vishers, vishing attacks

Scammers have found a way to exploit vulnerabilities in VoIP (Voice over Internet Protocol) via a scam called vishing. This scam works much like any phishing attack: a scammer purports to be a legitimate entity and asks the potential victim to provide sensitive information. Learn how vishers operate.

 

Page:   1234567891011121314151617181920212223242526

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016