Tag Search: security

Gooligan malware wreaks havoc on Android

Posted on Thursday December 15, 2016  |  security, malware, gooligan, google, ghost push, android

2016december15_android_aGoogle has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to glean info, but rather to initiate downloads. Read on to find out more about the Gooligan virus and how it is affecting your business.

 

Predicting cyber-threats in 2017

Posted on Tuesday December 13, 2016  |  security, protection, network security, cybercrime, cyber attacks 2017, cyber threats

hackerscybersecurity-170px-01As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, forewarned is forearmed. Here are some of the threats we predict in the coming year.

 

iPhone video bug crashes Apple devices

Posted on Friday December 02, 2016  |  security, iphone, honey, corrupt video, apple

2016december2_apple_aApple iOS users beware -- there's a five-second video that can harm your iPhone. In late November, the brief MP4 clip seemed innocent enough. But after iPhone users played the video, their iPhones began to slow down and eventually crash. Details of the iPhone-killing bug are still being investigated, but here's what we know so far.

 

Potential security breach for Android users

Posted on Tuesday November 29, 2016  |  security, kryptowire, google, backdoor, android, adups

2016november29_android_aAndroid users may have reason for concern regarding their device security as well as the information transmitted by their phones. A backdoor security breach has recently been identified in Android devices that could cause user data to be sent to China. Because of the major risks that this security breach poses, it is important for Android users to learn about this vulnerability as soon as possible.

 

Office 365 reveals new security features

Posted on Thursday November 17, 2016  |  security suite, security, productivity insight, office 365, delve analytics, azure rms

2016november17_office_aOffice 365 has given business owners access to online organizational programs and collaboration tools for years. In an effort to become more user-friendly, Microsoft recently added new features to Office 365, including two security upgrades and the addition of productivity tracking. Keep reading to find out more about Office 365's new Azure Information Protection, Enterprise Mobile Device Management and Productive Insight features.

 

2 types of identity verification, explained

Posted on Tuesday October 25, 2016  |  two step authentication, two factor authentication, security, password

2016october25_security_aCyber security is becoming more and more important in an increasingly digital age. While many people and businesses know how important their online security is, they may not know what types of online security are best, nor the differences between the most commonly available options. There are two security authentication measures that are quite similar in name and that are often used. These are known as two-factor authentication and two-step authentication. Read on to get to know some of the key differences so you can be sure you understand your cyber security better.

 

Page:   1234567891011121314151617181920212223242526272829303132333435363738394041424344454647

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016