Tag Search: cybersecurity
Posted on Friday November 25, 2016 | small business, data breaches, cybersecurity
If you've read our blog before, you know security is paramount to the success of any business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, and devices have been illegally accessed by unauthorized people. Today let's look at simple preventive measures to ensure these risks don't befall your business.
Posted on Wednesday November 23, 2016 | internet of things, hardware security, cybersecurity
After the recent Dyn attack that took Netflix and other major websites down, business owners are vigilant about ensuring the security of their network and devices connected to the "Internet of Things" (IoT). A new scanner from Bullguard promises to warn owners of potential entry points for hackers. Keep reading to learn more about Bullguard's IoT Scanner and how it can help you keep your company data secure.
Posted on Thursday November 10, 2016 | social engineering, phone scams, cybersecurity
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they're taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists are targeting the younger generation -- and succeeding.
Posted on Monday October 24, 2016 | voip, tdos attack, dos attack, cybersecurity, cyberattackers
When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren't the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the biggest threats to these systems is denial of service (DoS) attacks, and if you have a VoIP system it's imperative you learn more about it here.
Posted on Friday October 07, 2016 | social engineering, security, phishing, cybersecurity
Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.
Posted on Wednesday September 07, 2016 | windows, vulnerability, update, threat, smb, ruse, file, fantom, fake, encryption, downtime, data, cybersecurity
It's hard to deny how quickly the different types of ransomware multiply -- they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like "a wolf in sheep's clothing" -- impending danger lurks beneath the most seemingly innocent guises.