Tag Search: cybersecurity

Five tips to avoid a security breach

Posted on Friday November 25, 2016  |  small business, data breaches, cybersecurity

2016november25_security_aIf you've read our blog before, you know security is paramount to the success of any business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, and devices have been illegally accessed by unauthorized people. Today let's look at simple preventive measures to ensure these risks don't befall your business.

 

IoT scanner detects at-risk “Smart Devices”

Posted on Wednesday November 23, 2016  |  internet of things, hardware security, cybersecurity

2016november23_hardware_aAfter the recent Dyn attack that took Netflix and other major websites down, business owners are vigilant about ensuring the security of their network and devices connected to the "Internet of Things" (IoT). A new scanner from Bullguard promises to warn owners of potential entry points for hackers. Keep reading to learn more about Bullguard's IoT Scanner and how it can help you keep your company data secure.

 

Young workers are more gullible to tech scams

Posted on Thursday November 10, 2016  |  social engineering, phone scams, cybersecurity

2016november10_security_aThe old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they're taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists are targeting the younger generation -- and succeeding.

 

Denial of service attacks on VoIP systems

Posted on Monday October 24, 2016  |  voip, tdos attack, dos attack, cybersecurity, cyberattackers

2016october24_voip_aWhen most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren't the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the biggest threats to these systems is denial of service (DoS) attacks, and if you have a VoIP system it's imperative you learn more about it here.

 

Social engineering and cyber security

Posted on Friday October 07, 2016  |  social engineering, security, phishing, cybersecurity

2016october7_security_aSocial engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.

 

Fantom: the latest cybersecurity spectre

Posted on Wednesday September 07, 2016  |  windows, vulnerability, update, threat, smb, ruse, file, fantom, fake, encryption, downtime, data, cybersecurity

2016September7_MicrosoftWindowsNewsAndTips_AIt's hard to deny how quickly the different types of ransomware multiply -- they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like "a wolf in sheep's clothing" -- impending danger lurks beneath the most seemingly innocent guises.

 

Page:   1234567891011121314151617181920212223242526

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016